Claim Missing Document
Check
Articles

COLLABORATIVE FILE SHARING SYSTEM USING JXTA P2P NETWORKING INFRASTRUCTURE – AN APPLICATION DEVELOPMENT Kasyful Amron
Journal of Environmental Engineering and Sustainable Technology Vol 4, No 1 (2017)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1121.463 KB) | DOI: 10.21776/ub.jeest.2017.004.01.6

Abstract

This work aims to develop a simple workflow based collaborative application running over peer to peer network. Basic features of the application are to support communication and coordination in a workflow-based document production. Its offer services for text chat and file sharing. Text chat has two features, group chat or conference and personal chat, while file sharing service supports both synchronous and asynchronous mode that implies a repository function. As this application is developed with the assumption that it will be applied within a close environment, it is complied with a general security mechanism. Design and development processes of this application are depicted in the form of UML diagrams and implemented using Java Programming Language.
Implementasi Serangan Aktif Pada Algoritme Speck 128/128bit Berbasis Modul Komunikasi Lora Dian Astika Rini; Ari Kusyanti; Kasyful Amron
ikraith-informatika Vol 6 No 2 (2022): IKRAITH-INFORMATIKA Vol 6 No 2 Juli 2022
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1718.87 KB)

Abstract

LoRa (Long Range) termasuk pada konektivitas IoT nirkabel terbaru yang sedang berevolusi dan mendapatkanpopularitas dalam sistem tertanam dengan dioperasikan menggunakan daya rendah. LoRa perlu mentransfersejumlah kecil data pada interval pendek dengan jarak yang jauh. Modul komunikasi LoRa menggunakangelombang radio untuk melakukan komunikasi. Perangkat LoRa dihubungkan dengan frekuensi yang sama. Selainitu, dikarenakan LoRa menggunakan frekuensi sebagai metode komunikasinya, maka LoRa memiliki fitur yaitubroadcast. Pada fitur ini, LoRa mentransfer data pada frekuensi yang sama. Sehingga hal tersebut menjadi sebuahmasalah apabila terdapat perangkat LoRa yang melakukan transfer data penting, dikarenakan pada dasarnya LoRasendiri tidak memiliki upaya keamanan. Solusi berdasarkan permasalahan tersebut adalah diberikannya sebuahupaya keamanan yaitu berupa enkripsi pada data atau pesan yang dikirimkan. Pada penelitian yang dilakukan olehSemiconductor 2018 telah menerapkan algoritme AES-128 pada perangkat LoRa Namun terdapat penelitian lainyang menguji keefektifan algoritme AES-128bit dan menemukan beberapa kekurangan. Sehingga, pada penelitianini diterapkan algoritme SPECK 128/128bit yang memiliki kelebihan sehingga dapat menutupi kekurangan darialgoritme sebelumnya untuk mengamankan pesan penting yang dikirimkan agar tidak mudah dibaca oleh pihakyang tidak sah. Untuk menguji kemananan, serangkaian serangan aktif dan pasif dilakukan yaitu dengan metodeknown-plaintext attack. Hasil dari penelitian ini, sistem mampu memberikan keamanan pada pesan yangdikirimkan dengan mengirimkan pesan dalam bentuk ciphertext sehingga keamanan komunikasi antar modul LoRamenjadi terjamin.
Implementasi Known-Plaintext Attack Algoritme Pada Grain-128a Berbasis LoRa Olivia Very Noorlinda; Ari Kusyanti; Kasyful Amron
ikraith-informatika Vol 6 No 2 (2022): IKRAITH-INFORMATIKA Vol 6 No 2 Juli 2022
Publisher : Fakultas Teknik Universitas Persada Indonesia YAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1508.334 KB)

Abstract

Long-Range (LoRa) merupakan teknologi Low Power Wide Area Network (LPWN) yang menggunakanmodulasi Chirp Spread Spectrum (CSS) yang berasal dari skema modulasi spread spectrum yang mampumempertahankan daya rendah serta meningkatkan jangkauan komunikasi yang dibutuhkan pada Internetof things (IoT). Perangkat LoRa melakukan komunikasi melalui radio gelombang dengan frekuensi yangsama. Pada penelitian ini LoRa berperan sebagai node dan gateway yang melakukan pengiriman datapada LoRa melalui broadcast dengan frekuensi yang sama. LoRa memiliki kelemahan pada keamanandatanya, di mana data yang dikirimkan ke node gateway masih rentan terhadap serangan pihak ketiga.Keamanan pada LoRa dapat ditingkatkan dengan menambahkan algoritme Grain-128a pada node dangateway yang bertujuan untuk memberikan keamanan pada data yang dikirimkan oleh node ke gateway.Grain-128a merupakan algoritme enkripsi yang menawarkan autentikasi opsional, yaitu melakukanenkripsi dengan autentikasi dan tanpa autentikasi pada data. Pada penelitian ini Grain-128a berhasilmelakukan pengamanan pada data suhu dan pada modul komunikasi LoRa berdasarkan dari pengujianyang telah dilakukan. Pada pengujian known-plaintext attack yang dilakukan, penyerang tidak berhasilmengetahui plaintext dari ciphertext yang dihasilkan algoritme Grain-128a. Hal ini membuktikan bahwapenyerang tidak berhasil melakukan penyerangan, dan algoritme Grain-128a berhasil melakukanpengamanan pada data.
Pengembangan Push Notification Menggunakan Websocket Andrias Yudianto; Eko Sakti Pramukantoro; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 1 (2017): Januari 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1009.287 KB)

Abstract

Untuk memenuhi kebutuhan masyarakat akan ketersediaan informasi, maka dikembangkan teknologi dengan nama push notification. Teknologi push notification adalah teknologi yang memungkinkan sebuah perangkat (client) mendapatkan informasi berupa notifikasi yang dikirimkan oleh penyedia informasi (server) secara otomatis. Pada umumnya mekanisme pengiriman notifikasi dari server ke client menggunakan push service yang berdiri sendiri (broker) dan menggunakan protokol Hypertext Transfer Protocol (HTTP). Namun masih sering terjadi keterlambatan pengiriman notifikasi dengan menggunakan mekanisme pengiriman tersebut. Broker yang membatasi antar server dan client dalam mekanisme pengiriman notifikasi dinilai tidak efisien. Diperlukan pengembangan lebih lanjut untuk mengatasi dua masalah tersebut. Penelitian ini akan mengembangkan mekanisme pengiriman notifikasi dengan push notification yang akan diimplementasikan dengan menggunakan protokol websocket dan implementasi broker kedalam server. Hasil pengembangan pada penelitian memiliki jumlah maksimal client yang dapat terhubung dengan server sebanyak 1015 client serta rata-rata delay yang didapat dari pengujian pengiriman notifikasi secara massal, pengiriman notifikasi dengan ukuran yang berbeda, dan pengiriman notifikasi menggunakan bandwidth yang berbeda.
Analisis Performansi dan Skalabilitas pada Event-Based IoT Middleware Mohammad Fahrur Rozi; Eko Sakti Pramukantoro; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 7 (2017): Juli 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (930.753 KB)

Abstract

Internet of Things (IoT) is a system where its contained devices are interconnected which makes it possible to exchange information or data via Internet. Middleware is an intermediary system between hardware and software which contained in IoT system. In the previous research, middleware was developed to overcome interoperability problem by providing multi-protocol gateway for CoAP MQTT and Websocket. There are several aspects to test middleware such as integration, interoperability, scalability, real time performance, and security. In the previous research, integration testing was performed to test the suitability of middleware with its functional requirements and interoperability testing in order to know the level of middleware interoperability, therefore in this research a test performed with other aspects which is performance and scalability. The results of performance and scalability analysis are average CPU usage of CoAP protocol was 0.68%, MQTT 0.60% and CoAP MQTT 1.21%, average Memory usage of CoAP was 5-7%, MQTT 8-9%, and CoAP MQTT 10-12%. The average delay time of sending data from nodeMCU to middleware for CoAP and MQTT is 3 seconds. The average data transmission delay time from nodeMCU to middleware with packet loss is varied between 0% - 75%. The ability of middleware to overcome publish or subscibe in one second with 100 to 1000 clients grows as the number of clients increases.
Analisis Performa Protokol 802.11n Pada Mikrokomputer Raspberry Pi Retno Perwita Sari; Kasyful Amron; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 12 (2017): Desember 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (793.041 KB)

Abstract

The need for better infrastructure development to support human resources (HR) needs to be done. One of the important infrastructure is the information technology infrastructure in the field of telecommunication. Adequate telecommunication facilities are expected to help rural areas. One of the way is with wireless technology. Wireless technology has advantages in easy installation and cheap because it does not need a cable. Wireless technology can be implemented in the form of wireless mesh with the selection of the 802.11 as a wireless protocol because it supports multiple devices and has a wide range. It is also necessary routing protocol in this research that is OLSR. OLSR to be selected due to the OLSR work concept that always updates the routing table at any times. Choosing Raspberry Pi for microcomputer due to wifi requirement that must be available that can not be given by microcontroller like arduino. Once a facility is established, a performance test is required to determine the performance of the protocol and the microcomputer used in accordance with the field conditions. Parameters in the performance testing protocol 802.11 and Raspberry Pi is packet loss, delay, throughput, CPU and memory usages. From the test results showed that the highest packet loss reached 0.38% when the measured data is the largest data in this study that is 65507 B. Highest delay reached 1.09 second while the experiment with a large data 32768 B, the largest throughput reached 64.13 Bps on the largest data is 65507 B, CPU usage is only 0,5% and memory that not exceed than 0,8% of total CPU resources available.
Analisis Perbandingan Performa Algoritma Round Robin dan Least Connection untuk Load Balancing pada Software Defined Network Agung Nugroho; Widhi Yahya; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 12 (2017): Desember 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (772.358 KB)

Abstract

The development of internet technology whom the users desire for the availaible services anytime tend to be increased following the current development which commonly not always supported by the increasing adequate server services. The highest users demand make the work load in server raised rapidly which cause down server in a short period along with the needs of technology which handle the utilization of complex connections. As a new technology, Software defined network offers scalability and programmability for the using of connections which become complex such as Balancing Web Server. There are some studies concerning with load balancing in Software defined network (SDN) with various algorithm which is applied will resulted difference performance from algorithm, , one of them is Round robin and Least connection. The experiment is done with 3 categories; low, medium, and high. The experiments parameter which is used are Throughput, Response time, and CPU Usage use Httperf and Psutil. Round robin Algorithm is more excellent than Least connection Algorithm in a tiny connection. On the other hand, for the bigger connection, Least connection Algorithm is excellent. The average value of time response shows the superiority of Round robin Algorithm rather than Least connection Algorithm. CPU Usage server with the Round robin Algorithm is more stable in each rate category. On the contrary, Least connection Algorithm is less of load than Round robin Algorithm in spite of the value is raise in each rate category.
Implementasi Quality of Service pada Protokol Message Queue Telemetry Transport - Sensor Network (MQTT-SN) Berbasis Arduino dan NRF24L01 Sofi Hanifah; Sabriansyah Rizqika Akbar; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 6 (2018): Juni 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1270.779 KB)

Abstract

Message Queue Telemetry Transport - Sensor Network (MQTT-SN) is a communication protocol derived from the Message Queuing Telemetry Transport (MQTT) protocol that applied to the sensor network. To apply MQTT-SN requires Quality of Service (QoS). QoS is a method of measuring the quality of network and an attempt to define the characteristics and properties of a service so that messages are received. The Application of QoS in MQTT-SN is very important to ensure the receipt of data. This research implies QoS mechanism on Arduino Nano with NRF24L01 wireless communication using MQTT-SN message format. In this research is tested with different QoS level to get different result in each level of QoS. MQTT-SN with QoS level 0 allows packets not to reach the gateway because publishers continue to publish without any reciprocity from the gateway that make publishers don't know wether the message is delivered to the destination or not, and average accepted message 70%. While MQTT-SN with QOS level 1 the gateway can not distinguish publish data at the first time and next so duplicated messages can be happen until 30%. MQTT-SN with QoS level 2, the message is received exactly once due to temporary data storage on the gateway that make protocol will ignore data that is not needed and average accepted message 100%.
Analisis Performa State Snapshot Transfers (SST) Tipe Blocking (Rsync) dan Non Blocking (Xtrabackup-V2) pada MariaDB Galera Cluster Gilang Ramadhan; Mahendra Data; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1125.575 KB)

Abstract

Reliability and availability of database server becomes the crucial things of application system. There are so many researches that have been done in order to increase the reliabilty and availability of database server. The example is using database replication mechanism. MariaDB is one of DBMS that has a replication mechanism through MariaDB Galera Cluster application. MariaDB Galera Cluster has several methods called State Snapshot transfer (SST) which is used for replication process, namely Rsync, Xtrabackup, Xtrabackup-v2, and Mysqldump. This study focused to compare the performance of Rsync method and Xtrabackup-v2 method. The experimental results show that both methods have a similar performance. Number of nodes in a cluster can affect the performance of cluster. Cluster with two nodes would be more vulnerable to become an error if one of the node becomes has failed. Therefore, the minimum number of nodes on a cluster is three on condition that there is just one node that failed. This experiment also results another conclusion that SST method that used and number of nodes can affect the replication times. Rsync method has a shorter duration of replication compared to the Xtrabackup-v2.
Implementasi Simple Service Discovery Protocol (SSDP) untuk Pencarian Layanan pada Wi-Fi Direct Berbasis Android Redila Permata Anindita; Eko Sakti Pramukantoro; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1189.555 KB)

Abstract

Over the past years, the use of wireless technologies has been increased and has changed how the electronic devices interact and communicate. Wi-Fi Direct is one of wireless technologies exist. Wi-Fi is the development of Wi-Fi Alliance by utilizing Peer-to-Peer infrastructure. The purpose of Wi-Fi Direct technology is to improve device-to-device communication directly with Wi-Fi. On a Wi-Fi Direct network, a service discovery algorithm is needed to help them share their services. This study aims to implement the service discovery algortihm on one group of Wi-Fi Direct with the Simple Service Discovery Protocol (SSDP) algorithm and test performance of the system. Performance testing experiments of this study to determine the delay of some process that is done, in the process of peer discovery, forming group, and service discovery with SSDP. The result of impementation SSDP algorithm on one group of Wi-Fi Direct can be concluded that a Group Owner can share the service to its clients and based on the performance testing obtained result for the fastest delay of peer discover process is 10,328 seconds and the longest delay of peer discovery is 19.914 seconds, for delay of the group formation process the fastest delay of 0.305 seconds and the longest delay of 0.633 seconds, for service discovery process with SSDP delayed fastest in 0.035 seconds and the longest delay in 0.065 seconds.