Rr.Yuliana Rachamawati, Rr.Yuliana
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal Jarkom

BANDWIDTH MANAGER MENGGUNAKAN HIERARCHICAL TOKEN BUCKET PADA IMPLEMENTASI VIDEO STREAMING Soba, Saryadi K T; Rachamawati, Rr.Yuliana; Raharjo, Suwanto
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTScience and technology are increasingly evolving, has brought a wide range of new breakthrough, one that is increasingly technologically sophisticated and modern. This also participate in the field of computerization, computers that previously had limited functions only as a mere data processing, but now is able to play a major role in peoples lives everyday.Streaming video service is now urgently needed. It is characterized by many organizations or institutions that use streaming video access in bulk. The use of video streaming en masse this  network performasi downs along with the increasing number of users. One way to reduce the decline in performance is to set the bandwidth.Hierarchical Token Bucket (HTB) as implementer management of bandwidth available for free and can be run on Linux Operating system platform is a viable Bandwidth Manager analyzed their advantages and disadvantages, is expected to use proper and accurate will create a network that implements Bandwidth Manager is working optimallyKeywords: HTB, limit, bandwidth.
SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachamawati, Rr.Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Network security is a matter that needs to be given special attention, because infiltration often occurs with a variety of purposes. Intrusion detection systems (IDS) is a method of network security by detecting intrusion and provide output results in the form of alerts that can be known through the web. To implement the various components of the detection system is needed in order to maximize performance. In this study, the application is used as a detection system Snort attack. Basic Analysis and Security System (BASE) is used as a web interface. Log storage media attacks using MySQL. Fields marked with an ICMP protocol detection system ie, TCP and UDP. To follow up, use iptables and portsentry in the IP address blocking intruders. Attacks that occur can be analyzed using BASE, this application can indicate the type of attacks carried out and can see the span of attack for several months. By analyzing the types of attacks that occur, can help administrators reinforce the gap. Keywords : IDS, intruder, network security