Claim Missing Document
Check
Articles

Found 5 Documents
Search

Smart Chicken Coop Control and Monitoring System Design Automatically with Smartphone Notifications Sri Novida Sari; Romulo Aritonang; Sumarlin
Brilliance: Research of Artificial Intelligence Vol. 1 No. 2 (2021): Brilliance: Research of Artificial Intelligence, Article Research November 2021
Publisher : ITScience (Information Technology and Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (605.396 KB) | DOI: 10.47709/brilliance.v1i2.1193

Abstract

Technological developments and industrial automation encourage humans to meet their needs quickly. So that robotics technology was developed to help ease human work in the future. The chicken breeder is a business that has great profit prospects because the consumption of chicken meat in the community increases every year. It takes good management of chicken farmers so that farmers can get good harvests. In this study, the author designed a monitoring system to monitor conditions in the chicken coop such as temperature, light, feeding, and drinking. The smart chicken coop system that the author designed uses Smartphone notifications so that the condition of the chicken coop can be viewed and controlled using a smartphone via the internet/wifi network.
Teknik Maksimalisasi Keamanan Jaringan Hotspot Link dengan Metode Filtering IP Address dan MAC Address Pada SMA 1 Stabat Vidya Fitrah Aura; Surya Ananda; Reni Aulia; Reni Safitri; Sumarlin; Devita Permata Sari
JURNAL INFORMATIKA DAN PERANCANGAN SISTEM (JIPS) Vol 5 No 1 (2023): Volume 5, No.1 Januari 2023
Publisher : Prodi Teknik Informatika (S1) Institut Teknologi dan Bisnis Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (250.704 KB)

Abstract

Use of Hotspot services in daily life every year in increasing, because the Hotspot network makes it easy for its users. But besides the convenience, the Hotspot network also has weaknesses. Each user has the right to enter and exit easily into the network. This cause security holes to become vulnerable to access rights being breached. One way to secure the Hotspot Link network is by using the IP Address And MAC Address filtering method, it is able to drop the IP Address And MAC Address of each connected client. This research was conducted using Mikrotik, Radio HS AirPo and the Winbox Application. The result of this study are able to maintain and overcome security problems in the Hotspot network.
Mikrotik Optimization and Pc Cloning on Computer Networks with Using UBIQU Satellite Internet Vsat Broadband S Sumarlin; Muhammad Zarlis; S Suherman; Syahril Efendi
Brahmana : Jurnal Penerapan Kecerdasan Buatan Vol 4, No 1A (2022): Edisi Desember (Spesial Issue)
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/brahmana.v4i1A.140

Abstract

The internet is currently growing rapidly. The need and rapid development in the use of the Internet network requires a balance in the provision of Internet facilities. Internet standard services are the continuity of the connectivity of the Internet. Connections from the Internet are required to always be awake under any conditions, but not always connectivity will run smoothly, many obstacles or disturbances are encountered so that the connection does not run smoothly. One effective method that can be done is to apply the PCQ method in dividing the amount of internet bandwidth by paying attention to the distribution pattern of bandwidth speed based on the number of active users at a certain time. The subjects taken in this study were users who were active during the active period of students and other users in the Hotspot network at the Indonesian Institute of Technology and Business. The method used is a case study method based on the level of activity of the hotspot network on campus. Comparison between the amount of bandwidth for the number of users between the hours of high activity in the morning until the afternoon, and the hours of low activity in the afternoon until the evening. The PCQ method will divide the bandwidth based on the number of active users on the hotspot with the same amount. The design is continued by applying the PCQ method using Miktrotik Routerboard, testing is carried out by technical testing by testing the amount of bandwidth with division based on the number of active users and the same results are obtained.
Analisis Keamanan Jaringan Komputer Berbasis Routerboard Mikrotik Rb941 dengan Metode Extended Access List Pada SMK Negeri 1 Stabat Eva Agus Pratiwi; Desti Putri Rahayu; Priska Ayu Syahputri; Popi Melita; Sumarlin; Surizar Rahmi Danur
JURNAL INFORMATIKA DAN PERANCANGAN SISTEM (JIPS) Vol 5 No 2 (2023): Volume 5, No.2 Mei 2023
Publisher : Prodi Teknik Informatika (S1) Institut Teknologi dan Bisnis Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security in computer networks is very important to monitor network access and prevent unauthorized misuse of network resources. The task of network security is to protect and prevent it from causing system losses and damage to computer networks. One aspect of computer network security is to use the Extended Access List method, which is a type of Access Control List (ACL), which is an appropriate security method for network communications. The Extended Access List plays a role in managing the access rights of each host in a network simulation. The Extended Access List can filter network data traffic by controlling whether packets are forwarded or stopped. The Extended Access List can also guarantee computer security so that communication lines and access rights for each computer can work properly. With the Extended Access List method, it is hoped that it can monitor network access and prevent unauthorized misuse of network resources.
Performance Analysis of Mesh Network Implementation Using Mikrotik RouterBoard 941 in Radio Link-Based Secure Networks Riska Andian Turnip; Kitu Gea; Yoga Pramadio Purba; Rasme Kita Kaban; Sumarlin; Ita Margaretta Br Tarigan
JCEIT: Journal of Computer Engineering and Information Technology Vol. 2 No. 2 (2026): JCEIT: Journal of Computer Engineering and Information Technology (March 2026)
Publisher : Karya Techno Solusindo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.64810/jceit.v2i2.53

Abstract

The increasingly rapid development of computer network technology demands a network system that is reliable, flexible, and able to adapt to dynamic environmental conditions. One of the network technologies that is currently developing is mesh networking. Mesh networking is a network topology where each node can be connected to each other directly or indirectly through other nodes. This research aims to analyze the application of the mesh networking method using the Mikrotik RouterBoard 941 device. The research method used is experimental by configuring, implementing, and testing mesh networking on the Mikrotik RouterBoard 941. The results of the research show that mesh networking can be applied to the Mikrotik RouterBoard 941 by utilizing available features, such as OLSR (Optimized Link State Routing) and WDS (Wireless Distribution System). Mesh networking is able to increase redundancy and network availability, and can adapt to changes in network topology. However, mesh networking also has several disadvantages, such as configuration complexity, routing overhead, and the possibility of bottlenecks at certain nodes. REFERENCES   Adiguna, M. A. (2022). WPA2-PSK network security analysis using penetration testing method (Case study: TP-Link Mercusys MW302R router). Anhar. (2020). Jaringan komputer dan internet. Informatika. Athailah. (2020). Bandwidth management in optimizing the use of Mikrotik routers for network connection services. Journal of Informatics, 7(2), 70–78. Brown, S. (2021). Computer network development system. McGraw-Hill. Cisco Networking Academy. (2020a). Introduction to networks: OSI model. Cisco Press. Cisco Networking Academy. (2020b). The application of virtual local area network. Journal of Electrical Engineering Innovation, 1(1), 70–80. Danniel. (2021). Comparison of IPv4 and IPv6 in building networks. International Journal of Computer Networks, 3(2), 30–40. Efendi, M. Y. (2021). Comparative analysis of 128-bit WEP and WPA wireless security methods to improve wireless security. Journal of Information Security, 5(1), 10–18. Goldsmith, A. (2020). Wireless communications. Cambridge University Press. Hamacher, V. C. (2020). Decision-making model under complex picture fuzzy Hamacher aggregation operators. Journal of Intelligent Systems, 9(8), 47–68. Harefa, M. F. (2021). User data security applications and wireless security systems using two-factor authentication and MAC address filtering. Journal of Computer Security, 4(1), 20–28. Harmayani, H., Abdilah, D., Mapilindo, M., Oktopanda, O., & Hutahaean, J. (2021). Aplikasi komputer. Yayasan Drestanta Pelita Indonesia. Heart, A. (2020). Analysis and implementation of Mikrotik router security system from Winbox exploitation, brute-force, and DoS attacks. Jurnal Media Informatika Budidarma, 4(1), 57–59. Jackson, M. (2020). Hierarchical network design-based network security system design. International Journal of Network Security, 5(8), 1–9. John, A. (2021). Analysis and application of Mikrotik RB890. Journal of Network Engineering, 2(6), 50–60. Kamila, M. (2024). Design and construction of practicum module simulation of microwave link installation on mobile systems based on virtual reality technology. Kozierok, C. M. (2021). The TCP/IP guide: A comprehensive, illustrated internet protocols reference. No Starch Press. Madcoms. (2020). Network security implementation using port blocking and port knocking methods on Mikrotik RB941. Journal of ICT: Information Communication & Technology, 5(1), 16–17. Michael, J. (2021). OSI model fundamentals. Computer Networks Journal, 1(5), 1–8. Molisch, A. F. (2021). Wireless communications (2nd ed.). Wiley. Prayoga, J. (2021). Comparison of WPA2 EAP-PSK authentication system on wireless networks using penetration testing method with fluxion tools. Journal of Cyber Security, 3(1), 1–10. Permatasari, U. S., & Widiasari, I. R. (2020). Analisis routing protokol optimized link state routing (OLSR) pada Raspberry Pi. Jurnal Teknologi Informasi (AITI), 16(2), 151–164. Primaned, A., Widyawan, W., & Kusumawardani, S. S. (2014). Unjuk kerja routing protocol OLSR pada wireless mesh network berbasis IEEE 802.11b/g. Jurnal Nasional Teknik Elektro dan Teknologi Informasi, 1(1), 8–12. Defri, E. O., Kusmaryanto, S., & Mustofa, A. (2019). Implementasi jaringan access point dengan wireless distribution system (WDS) berbasis Mikrotik. Jurnal Mahasiswa Teknik Elektro Universitas Brawijaya, 7(7). Politeknik Sawunggalih Aji. (2021). Rancang bangun wireless mesh network menggunakan routing OLSR. Jurnal Nasional Teknik Informatika, 9(2). Sofana, I. (2021). Jaringan komputer berbasis TCP/IP. Informatika. Stevens, W. R. (2020). TCP/IP illustrated (Vol. 1). Addison-Wesley. Supendar, H., & Handrianto, Y. (2017). Simple queue in resolving bandwidth management issues on the Mikrotik bridge. Bina Insani ICT Journal, 4(1), 21–30. Sutiono. (2020). Sistem keamanan jaringan. Deepublish. Tanenbaum, A. S., & Wetherall, D. J. (2020). Computer networks (5th ed.). Pearson. Wheeb, A. H., Nordin, R., Samah, A. A., & Kanellopoulos, D. (2023). Performance evaluation of standard and modified OLSR protocols. Electronics, 12(6), 1334. Widiyawati, S. (2020). Network security system firewall using port blocking and firewall filtering methods. Journal of Information Security, 5(2), 78–96. Wirano, B. (2020). Policy analysis from formulation to implementation. Deepublish.