Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : Journal JCONES

Aplikasi Network Inventory Collection System Untuk Medukung Perencanaan Investasi Teknologi Informasi Sukmaaji, Anjik; Jusak, Jusak
Journal JCONES Vol 1, No 1 (2012): Pemanfaatan Teknologi Otomasi dan Jaringan Komputer
Publisher : Journal JCONES

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The growth of Information Technology (IT) investment is predicted to develop rapidly in the next few years. This will urge the need of a tool to help IT managers to manage and monitor their asset frequently. In this paper, we identify components that will contribute significantly to the planning of IT investment. The results were derived from a survey that was done in three big cities that might be considered as a representative of IT development in Indonesia, i.e. Jakarta, Surabaya and Denpasar (Bali). Based on the results of the survey, we have built a tool for managing and monitoring the IT assets, including configuration system, devices, storage media, interfaces and installed applications. The tool is utilizing the simple network management protocol (SNMP) for querying all IT assets information from each client/agent in a network.
ANALISIS PERBANDINGAN KINERJA PROTOKOL ON-DEMAND ROUTING PADA JARINGAN SENSOR NIRKABEL AD HOC Putri, Rizky Ananto; Jusak, Jusak; Sukmaaji, Anjik
Journal JCONES Vol 2, No 1 (2013)
Publisher : Journal JCONES

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some of developing countries recently employ network applications that use sensor nodes, Wireless Sensor Networks (WSN) for remote sensing. Most latest researchers, utilize methods with a network topology that has a fixed position. On the other hand, for remote monitoring network set up wireless networks typically use ad hoc and irregular distributed by its users. A study needed to create a network system with randomly generated positions. In this work we concern about wireless network that employ On Demand Routing Protocols, i.e. Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The result of the research shows that DSR has a better performance in term of delay and packet loss ratio compared to the AODV. On the other hand, AODV shows a better performance in term of bandwidth utilization.
ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL UDP DENGAN DCCP MENGGUNAKAN TRAFIK DATA MULTIMEDIA Adinata, Feri Setiawan; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of network technology has created a multimedia application enters the world of internet. Skype, Yahoo Messenger, Facebook and Line are some examples of applications that provides multimedia features such as free call (VoIP) and video call (video conference) in it. Most of these applications typically use UDP instead of TCP as the transport protocol. The increased of UDP traffic has threaten TCP traffic that appears issues of fairness between the two protocols.In 2006 the IETF introduced a new protocol called Datagram Congestion Control Protocol (DCCP) CCID2 and CCID3. In fact its almost 8 years was introduced to the public, such applications are not using DCCP instead of UDP. So the question of performance, fairness and the Quality of Service level arises for multimedia data services between UDP and DCCP.Based on the results of testing against the Protocol UDP and DCCP, it is found that the average bandwidth utilization between UDP and CCID2 are respectively, 62.15% and 36.54%, the packet loss 1.12% and 10.08%, both of the delay 627 ms, both of the jitter 141 ms and both of the fairness 0.923. Furthermore, the average bandwidth utilization between UDP and CCID3 reaches 63% and 29.79%, the packet loss 0.5% and 0.92%, the delay 148ms and 283ms, the jitter 46ms and 79ms and both of the fairness 0.874. In summary, it can be concluded that the DCCP CCID2 has better performance and more suitable for VoIP/Video Conferencing instead of using the DCCP CCID3.
PEMODELAN KARAKTERISITIK DENIAL OF SERVICE ATTACK MELALUI ANALISIS DATA TRAFIK Wijaya, Octavianus; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DoS is one example of attacks that can disrupt the infrastructure of computer networks, this type of attack has a typical pattern, where in each attack will send a number of data packets continuously to attack the target. DoS Attack consists of UDP, PING and SYN Flood Attack. This study aims to get a mean, relative frequency, parameter values, the probability distribution, plot the data and the value of MSE. Subsequently analyzed using statistical methods, and modeling to estimate the parameters in the form of a probability distribution. The probability distribution is composed of a gamma distribution, lognormal distribution and weibull distribution. By using this model, it can be shown that the DoS Attack characteristic of UDP Attack and SYN Flood Attack are much closer to the lognormal distribution than Gamma the distribution or Weibull distribution. On the other hand, the distribution of the PING flood attack resembles the gamma distribution.
ANALISIS PERBANDINGAN KINERJA PROTOKOL ON-DEMAND ROUTING PADA JARINGAN SENSOR NIRKABEL AD HOC Putri, Rizky Ananto; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 2, No 1 (2013)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some of developing countries recently employ network applications that use sensor nodes, Wireless Sensor Networks (WSN) for remote sensing. Most latest researchers, utilize methods with a network topology that has a fixed position. On the other hand, for remote monitoring network set up wireless networks typically use ad hoc and irregular distributed by its users. A study needed to create a network system with randomly generated positions. In this work we concern about wireless network that employ On Demand Routing Protocols, i.e. Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The result of the research shows that DSR has a better performance in term of delay and packet loss ratio compared to the AODV. On the other hand, AODV shows a better performance in term of bandwidth utilization.
ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL TCP VEGAS DAN UDP DENGAN MENGGUNAKAN DATA STREAMING Andini, Irene Rizky; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of an advanced technology has affected human living in the use of modern communication technology which based on data streaming. Streaming is a transmission technology of sending data, video or audio in real time or pre -recorded from the sender to the receiver. The usage of this technology is very diverse in various activities, so that the data streaming requires a rapid protocol performance in the delivery process. The final task generates comparative characteristics of TCP Vegas and UDP which based on the quality of data streaming services with the parameters of bandwidth utilization test, packet loss, latency, and jitter. The data streaming that has been used includes Voice over IP and video streaming. This comparison is performed using the network simulator 2.From the analysis that has been done, we get the value of the parameters that have been set. In general, it has been found that the percentage of bandwidth utilization on UDP protocol is larger than TCP Vegas. Then, the percentage of packet loss on TCP Vegas is higher than the UDP protocol. While, the value of a latency and jitter on TCP Vegas has a higher value than the UDP protocol. 
RANCANG BANGUN MODEL PENGUJIAN DESTROYER TESTER UNTUK MENGUJI SISTEM KEAMANAN JARINGAN Artanto, Bunggi Rivan; Sukmaaji, Anjik; Slamet, Slamet
Journal of Control and Network Systems (JCONES) Vol 5, No 2 (2016)
Publisher : Journal of Control and Network Systems (JCONES)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi memudahkan manusia dalam melakukan akses terhadap komputer standalone maupun jaringan komputer. Hal ini dapat berdampak pada keamanan data pada komputer. Sehingga penting dilakukan pengujian terhadap kebijakan keamanan yang akan diambil. Metode pengujian yang digunakan adalah destroyer tester. Teknik serangan yang digunakan dalam pengujian kali ini adalah dos attack. Hal ini bertujuan untuk menguji kekuatan sistem keamanan jaringan. Penelitian tahap pertama adalah melakukan konfigurasi dan pengumpulan data pada target. Tahap kedua adalah membuat aplikasi untuk melakukan pengujian dengan teknik dos attack. Aplikasi ini berbasis web dengan melakukan serangan ping of death, syn attack, smurf attack, land attack, dan UDP flood. Tahap ketiga adalah melakukan pengujian dan menganalisa sistem keamanan pada target. Berdasarkan hasil penelitian dengan metode destroyer tester pada sebuah webserver, dapat ketahui bahwa kekuatan sebuah webserver pada suatu jaringan tidak hanya terdapat pada konfigurasi sistem keamanan menggunakan firewall saja, akan tetapi juga terletak pada spesifikasi server yang digunakan sebagai webserver. Selain itu untuk mengatasi serangan ping of death dan smurf attack, dapat dilakukan dengan cara membatasi ukuran packet icmp yang masuk. Sedangkan untuk serangan syn attack dan land attack, dapat diatasi dengan membatasi jumlah packet syn yang masuk dan permintaan ack.
Co-Authors - Afrizal Adi Nugroho Adi, Satriyo Adiprasetya, Rachmat Agus Dwi Churniawan Al-fiqrie, Muhammad Biaggi Alde Mohammad Rilando Amrizal Rizky Fajar Ananta Raditya Murti Andi Rahmatullah Tohir Andi Rahmatulloh Tohir Andre Yusdianto Andy Ardianto Anggraeni, Anindhia Anggraeni, Anindhia Antok Supriyanto Apriyanto, Samuel Christian Apriyanto, Samuel Christian Arantika Dwi Fibriana Arif Prasetiyo Utomo Arifin Puji Widodo Arifin Pujiwidodo Artanto, Bunggi Rivan Arumsari, Farah Priminta Arumsari, Farah Priminta Azid Malil'ula Wildan Muchollad Azwar Anas Azwar Anas Benny Febriantono Chrisdiansyah, Lutfi Chrisdiansyah, Lutfi Christian, Samuel Damayanti, Metta Ameilia David Alfian Ariyoga Dhyaksa, Gilang Wira Dhyaksa, Gilang Wira Dimas Fitrah Maulana Dinanta, Rangga Dwiky Rachman Hidayat Ekodono, Yohanes Ekodono, Yohanes Endra Rahmawati Erik Priyo Trenggono Erwin Sutomo Faizal Ardhana Farah Priminta Arumsari Feri Setiawan Adinata Fibriana, Arantika Dwi Firdaus, Wigananda Franstia Wira Sukma Susilo Gilang Wira Dhyaksa Habib, Muhsin Hadi Prawiro, Irfan Hananto, Priyanggoro Dwi Harsono, Eko Febri Hendra Setyo A. Nugroho Hendrokusumo, Ridzki Henry Bambang Henry Bambang Setyawan Herry Susanto Kwee Hoky Ajicahyadi I Gusti Bagus Wiksuana I Putu Mulya Gunawan I Wayan Agus Ista Putra Mahardika Ibnu Muslim Imaniyah, Solechatul Imaniyah, Solechatul Irene Rizky Andini Jatmiko, Prasetyo Budi Jatmiko, Prasetyo Budi Jidny Ilma Mochamad Julianto Lemantara Jusak Jusak Jusak Jusak Khatulistiwa, Angga Kurniawan Jatmika Kurniawan Jatmiko Kwee, Herry Susanto Kwee, Herry Susanto Lengo, Elisabeth Maria Lengo, Elisabeth Maria Lestanto Atmaji Luh Putu Ratna Sundari M. J. Dewiyani Sunarto Marchella, Winda Mardianto Basuki Mario Angelo Kevin Buga Langoday Martinus Sony Erstiawan Metta Ameilia Damayanti Mochamad Asyari Putra Pratama Mochamad Imam Mahudi Rohmansyah Mochamad, Jidny Ilma Mohammad Andriyas Muammar Qadhafi Muchollad, Azid Malil'ula Wildan Muchollad, Azid Malil'ula Wildan Muhammad Fuad Muhammad Ilhamil Mi Roj Muslim, Ibnu Ningsih, Norma Nugraha, Rizaldi Octavianus Wijaya Pantjawati Sudarmaningtyas Prasetya, Gandhi Angga Prasetya, Gandhi Angga Prasetyo Budi Jatmiko Prayogi, Welly Abdi Prayogi, Welly Abdi Putra Fajar Sandy Yudha Putra, I Gusti Ngurah Alit Widana Putra, Wahyu Septiono Asmara Putra, Wahyu Septiono Asmara Rachmat Adiprasetya Rahmawati, Endra Ramdhani, Shubhan Rangsang Purnama Rilando, Alde Mohammad Rilando, Alde Mohammad Rio Astamal Rizal Randy Saputra Rizky Ananto Putri Rizky Dwi Nugroho Rohmansyah, Mochamad Imam Mahudi Rolando, Roy Sally Febriana Monica Samuel Christian Apriyanto Se, Malkus Willybrodus Slamet . Sofriansyah, Achmad Triadianto Sofriansyah, Achmad Triadianto Solechatul Imaniyah Soli, Leonard Onnanda Sri Suhandiah Stanly Dody Setiawan Subijono, Tony Subijono, Tony Sulis Janu Hartati Sulistiowati Sulistiowati Syahrizal Setia Wicaksana Tan Amelia Teguh Sutanto Teguh Sutanto Titik Lusiani Tony Soebijono Tony Soebijono Tutut Wurijanto Valentinus Roby Hananto Vicky M Taufik Vicky M. Taufik Vicky Mohammad Taufik Vivine Nurcahyawati Wahyuningtyas, Nunuk Wardana, Dwi Kusuma Wardana, Dwi Kusuma Welly Abdi Prayogi Wijaya, Anak Agung Angga Wijaya, Iwan Willybrodus, Malkus Wulandari, Sri Hariani Eko Yermias Alfandy Oktario Wun Yohan Kurnia Putra Tjumoko Yohanes Ekodono Yohanes Setiawan Yudha, Putra Fajar Sandy Yudha, Putra Fajar Sandy Yusuf Ongky Alexsander Zulfikar Rahman Zulfikar Rahman, Zulfikar