Claim Missing Document
Check
Articles

Implementasi Sistem Tracking Kereta Api dengan Protokol Publish Subscribe Sapta Oryza Putra; Adhitya Bhawiyuga; Mochammad Hannats Hanafi Ichsan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 9 (2017): September 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1234.856 KB)

Abstract

It's a common sense that the railways as a means of transportation is needed by all kind of people. In previous studies, GPS train tracking is done with XML RPC technology. For each train that will going to be tracked, it's being installed with an Android based mobile device that comes with an application which will sends GPS's signals that contains position data at a certain time's interval to a server via a webservice mechanism by utilizing XML RPC technology. The author believes, the method of publish/subscribe can be used to replace the method in the previous studies without having a result that inferior to XML RPC client-server. This study uses MQTT protocol (MQ Telemetry Transport) and Mosquitto broker to implement publish/subscribe architecture. Finally, it can be concluded that the quality of the produced delay is in compliance with the author's hypothesis, that the delays required to deliver messages generated by the publish/subscribe protocol are smaller than XML RPC protocol's delays, as has been shown in the preliminary research, where the resulting delay of XML RPC protocol are always greater than MQTT. This is being proved using 2 testing scenarios for each protocol, these are one-to-many testing and many-to-one testing.
Analisis Perbandingan Performansi Protokol Routing OLSR dan SOLSR Pada Wireless Mesh Network Sofyan Ainurrachman; Adhitya Bhawiyuga; Mochammad Hannats Hanafi Ichsan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 10 (2017): Oktober 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (923.816 KB)

Abstract

The performance of the routing protocol is a measure of the reliability of routing protocol. Routing protocol is a protocol that exchanges information in the form of a routing table to find the fastest route in sending data from the source node to destination node. OLSR is a proactive routing protocol that update it's topology information within a certain periode. OLSR protocol applies MPR mechanism to prevent some node receive a duplicate control message. SOLSR is a routing protocol based on OLSR with additional security mechanisms i.e signature message and timestamp exchange. Wireless mesh network (WMN) is a wireless network that formed from nodes which forming a mesh topology. The additional security mechanism in SOLSR routing protocol can affect the performance of the routing protocol itself. This research was conducted by measuring network performance of WMN with OLSR and SOLSR routing protocol. In addition, in this research author also make an attack simulation on routing protocol like replay attack and packet sniffing to examine the effect of attacks to performance of routing protocol both OLSR and SOLSR. Wireless mesh network (WMN) are formed from 5 router and 2 client. Based on result of this research, it is known that the additional security mechanisms in SOLSR affect the performance values under OLSR in self-configure time parameter and QOS performance on multihop network, but for the self-healing time between two routing protocols is not much different. In the attack simulation on routing protocol, it is known that the security mechanism on SOLSR can overcome the replay attack.
Implementasi Metode Klasifikasi Fuzzy K-Nearest Neighbor (FK-NN) Untuk Fingerprint Access Point Pada Indoor Positioning Baiq Findiarin Billyan; Adhitya Bhawiyuga; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 11 (2017): November 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1012.967 KB)

Abstract

Positioning is a technique used to determine the position of an object. There are two types of positioning technique: outdoor positioning and indoor positioning. An example of a system that can be used to measure outdoor positions is the Global Positioning System (GPS). GPS is a very common technology that known to know a position and as a pointer for displacement of objects through signals from satellites. GPS can provide good positioning in an outdoor environment, but the signal is very weak when used in a closed / indoor environment. Accordingly then developed a technology that serves to know the position of an object in indoor called Indoor Positioning. In this research we implements Indoor Positioning with Fingerprint method (signal strength recognition method) using measurement of signal strength (Received Signal Strength/RSS), that is by analyzed patterns strength of signal access point coming to receiver from every room. The first thing we did is to collect training data first as a basis for classification, then give the label. Next, we create a classifier based on training data. After that we re-measure as data testing to test its accuracy by Fuzzy K-Nearest Neighbor (FK-NN) classification method, and to make it easier to access the classifier that has been made, we use web service. The result of client position gives an accuracy level on K-Nearest Neighbor (K-NN) method with value k = 1 has value reaches 96%, for k=2 to k=7 has value reach 76%, and for k=8 to k=10 has value reach 73%. Meanwhile, FK-NN method with value k=1 and k=2 has value reach 96%, for k=3 to k=8 has value reach 76%, for k=9 has value reach 73%, and for k=10 has value reach 76%. Therefore, the implementation of Fuzzy K-Nearest Neighbor (FK-NN) classification method for Fingerprint Access point on Indoor Positioning has an enough accuracy level than the K-NN method.
Rancang Bangun IOT Cloud Platform Berbasis Protokol Komunikasi MQTT Moh Wildan Habibi; Adhitya Bhawiyuga; Achmad Basuki
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 2 (2018): Februari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (912.136 KB)

Abstract

Internet of Things (IoT) referring to a network that linking various device in the physical world with a variety of different protocols. However, there are limitations in terms of computing and storage because IoT device only use minimum computational and storage components. While cloud is a virtual environment that generally has a big capacity of computing and storage. By integrating cloud and IoT, it is necessary to divert IoT device's computational process and storage towards cloud, so that cloud can resolve the limitations on the IoT device. There are two main issues in the integration, heterogeneity and security. Heterogeneity refers to number range of devices that can communicate with the cloud, so it is necessary to use specific communication protocol so that all devices can be connected to the cloud. Security refers to the validity of the IoT devices that can transmit data to the cloud. From the previous explanation, then this research makes an architecture of IoT cloud platform that use MQTT communication protocol to resolve the problem of heterogeneity. Whereas to ensure the validity of IoT devices that can transmit data, constructed a mechanism to manage IoT device, authentication, and authorization. The performance test results showed, built systems capable of handling the publisher up to 250 publishers in each second.
Implementasi Autentikasi Json Web Token (Jwt) Sebagai Mekanisme Autentikasi Protokol MQTT Pada Perangkat NodeMCU Andri Warda Pratama Putra; Adhitya Bhawiyuga; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 2 (2018): Februari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1313.419 KB)

Abstract

IoT is a concept that aims to expand the benefits of continuously connected internet connectivity. MQTT is a protocol that used for M2M / IoT communications running over TCP / IP protocols designed as brokers based on the exchange of publish / subscribe messages for small code (eg 8-bit, 256KB ram controller), low power and bandwidth, connection and high cost, Availability of varables, negotiation of delivery guarantees (Špeh & Heđ, 2016). To perform client verification, traditional MQTT authentication uses the username and password in the authentication message. JWT is a very random string tokens for system authentication and information exchange. JWT secures information into a claim that is encoded into JSON and becomes a payload of JSON Web Signature (JWS) (Bradley, 2015). Token can be verified and trusted because it has been digitally signed can use HMAC or RSA. The contents of the signature on JWT is a combination of header and payload content, if there is a change in the header / payload then the signature will become invalid. NodeMCU is used as a publisher because the power consumption required by NodeMCU is less when compared to other sensor nodes such as Raspberry Pi. In this research, the implementation of JWT on MQTT using NodeMCU as publisher. In this research, there are three core test such as testing of username and password validation, expiration token test, and testing of token generate time. The result of this research is JWT that was implemented to validate username and password submitted by the publisher, JWT is able to authenticate the expired tokens, and the time required by the server to generate tokens is varied influenced by the response server to the publisher request vary.
Analisis Perbandingan Dampak Serangan Black Hole pada Peformansi Protokol Routing OLSR dan AODV di Jaringan Wireless Mesh Network Wian Virgi; Adhitya Bhawiyuga; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1441.322 KB)

Abstract

Wireless Mesh network (WMN) is a set of wirelessly connected nodes forming a mesh topology. Over the WMN, the process of transmitting data information requires a path to get to the destination node, namely reactive protocol and proactive protocol. Security wise, routing protocols are still vulnerable to various forms of attack, especially against active attacks that can destroy, modify and deleting not only data but also the information within. Based on the said problems, the writer decided to make a research called Comparative Impact Analysis of Black Hole Attack on the Performance of OLSR and AODV routing Protocols in Wireless Mesh Network's Network. The results obtained in this study is that the black hole attack does affects the performance of AODV and OLSR routing protocols. The test was done using OMNET++ with three test scenarios, that is to say, without-attack; with multiple-attack nodes; and with big-probability of attack. Test parameters include throughput, end-to-end delay, packet loss and packet delivery ratio. The result of research using 18 nodes of attacker showed that packet loss on OLSR is higher than AODV which is proved by the highest packet loss result in AODV that only has 99.33% while OLSR has 99,50%.
Rancang Bangun Infrastruktur Pemrosesan Big Data Menggunakan Apache Drill (Studi Kasus: SIRCLO) Yosef Hesekiel Partogi; Adhitya Bhawiyuga; Achmad Bazuki
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1024.548 KB)

Abstract

The Growing use of technology in society, really affect the intensity of society in doing online transaction for buy and sell items, including the competition between e-commerce companies. In order to compete with other e-commerce companies, SIRCLO, an e-commerce company, need to do an analytics to data that they have from all the transaction activities in their online shop, but to do that analytics, it needs a system that can read the raw dat. Based on those problem, this research is needed related to designing the infrastructure that can read those data. Basically, this research is using Apache Drill, HDFS as a file system, and script that written in Python to convert data from MySQL to JSON. This research starts from converting from data source (this research is using MySQL) to JSON, then will be stored in HDFS, and Apache Drill will do query to the file. Apache Drill is used because of the flexibility, it could do query with MySQL's syntax to plain text, and using schema free concept, also for file system is using HDFS because with hope that reading the data from distributed file system could be more effective and have better data management. This research was conducted with several scenarios, that is from the number of server that is used and size of the file, Parameter that's used is resource usage and process time of an activity. After this research is finish, this research acquired a design and component that can read SIRCLO's data, data from MySQL can be acquired and normalized to JSON, and after the design is implemented, this infrastructure can process SIRCLO's data.
Analisa Kinerja Algoritma TCP Congestion Control Cubic, Reno, Vegas Dan Westwood+ Aria Tanzila Harfad; Sabriansyah Rizqika Akbar; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1402.785 KB)

Abstract

Transmission control protocol (TCP) is a protocol at the transport layer that provides a reliable data transfer mechanism, so that the data stream reads TCP receiver is not corrupted, without duplication, and sequentially. To provide reliable data transfer, TCP provides error checking and flow control services. When the TCP sender sends data faster than the TCP receiver can handle, congestion will occur. TCP implements a congestion control mechanism for network traffic control so no congestion occurs. This study compares the performance of four variants of TCP congestion control, namely TCP Cubic, Reno, Vegas and Westwood +. The test is to analyze cwnd, ssthresh and throughput of four types of TCP Congestion Control algorithm. The author uses two devices as a sender and receiver. Both are connected with an ethernet cable that has a connection with 100Mbit/s bandwidth. TCP data is collected on the sender side using TCP Probe and the result is shown as a graph with Gnuplot. The results of this study indicate that TCP Westwood + is the best among the three other TCPs in all Service Center agreement (SLA) service provider environments with Bandwidth Estimation mechanisms they use.
Implementasi Protokol Websocket Pada Perangkat Non IP Berbasis NRF24L01 (Studi Kasus: Sistem Monitoring Suhu dan Kontroling Lampu LED) Labib Imam Hidayat; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 6 (2018): Juni 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1128.887 KB)

Abstract

In the current era of technology, the development of IOT (Internet of Things) Architecture has been growing very rapidly. With the increasing number of IOT devices, there are differences between the application layer protocol of the IOT devices. Which causes each devices to have their own application or can be called with the term “one device one app”. To resolve this problem, the use of web protocol to configure the entire application layer protocol or so-called WOT (Web of Things) is a great solution because of the characteristic of the web protocol which is universal. The previous concept of “one device one app” can be changed into “many device one app” which means many devices can be controlled by one application. The problem that arise next is some IOT devices that require real time connections and use radio communications as a method of sending and receiving data. One of the web protocols that supports real time communication is websocket. In radio communications, many devices are used as a choice of radio communication modules. One of the most widely used radio communication module is NRF24L01. By connecting IP protocols with non-IP radio devices, it takes a bridging device that bridges the difference so that data can be transmitted properly. Therefore, the authors conduct research for the implementation of websocket protocol as a web protocol on radio or non-IP devices with case studies of controlling and monitoring systems. The testing result of the sistem is the average time for data transmission of less than one second.
Analisis Performa Protokol LTE untuk Pengiriman Periodic Messages pada Vehicular Network Ferra Adelinna Wibowo Putri; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (726.081 KB)

Abstract

Long Term Evolution or LTE is a mobile wireless communications technology with downlink data transmission rate of 150 Mbps and 75 Mbps Uplink. Seeing good LTE performance, came the idea to combine LTE as a communication protocol on the vehicular network. Basically the vehicular network already has a de facto communication protocol that is an ad-hoc 802.11p short range communication. However, with close range transmission on the 802.11p protocol there is a problem with the communication between the vehicle and the Road Side Unit or RSU in the delivery of periodic messages on the condition of the vehicle moving at high speed and the RSU is not in a vehicle transmission span. Although LTE comes with non ad-hoc infrastructure but LTE offers wide transmission range and high transmission speed. To see the performance of LTE on the vehicle network then do the research, with traffic scenario closer to reality. Preferred scenarios are traffic scenarios with vehicle density, vehicle speed, transmission data and transmission frequency. The results show that LTE has a good performance to be applied and developed in the vehicle network. By showing a small value less than 500 ms in the graphics increase end-to-end delay and 0 % for packet loss on vehicle speed scenarios and messaging frequency in accordance with the needs of safety applications on the vehicular network.
Co-Authors Achmad Basuki Achmad Bazuki Achmad Brahmantyo Arundaya Subianto Agi Putra Kharisma Agung Setia Budi Ahmad Aji Santoso Ahmad Nasrul Illahi Alan Maulana Hamid Alfian Rizky Susanto Alldo Raafi'ilman Ammar Waliyuddin Jannah Andhika Dwitama Putra Andri Warda Pratama Putra Annisa Puspa Kirana Annisa Widuri Murti Utami Apriyanto J.P.L Tobing Apriyanto Tobing Ardhian Rizki Ramadhani Ardi Rahmad Hermanto ari kusyanti Aria Tanzila Harfad Arya Wardhana Budi Utomo Aswin Suharsono Bagos Wahyu Suprayugi Baiq Findiarin Billyan Dany P Kartikasari Dany prima Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dedy Andrean Ardiansyah Delarta Tok Adin Dhiza Wahyu Firmansyah Donny Kurniawan Dwiyan Ramadhan Dharmanzah Dyah Ayu Ocky Mawardani Dyah Ayu Prabandari Ekky Pramudito Setiawan Fabiansyah Raam Pontoh Fadhlan Muhammad Fahmi Syahrulah Fajar Hamid Embutara Ratuloli Fanny Aulia Rifki Farah Nabilla Putri Irzan Fariz Andri Bakhtiar Fariz Andri Bakhtiar Fathan Muhammad Fatkhurrozi Fatkhurrozi Fauzan Pahlawan Ferra Adelinna Wibowo Putri Fidia Rosianti Firman Budi Safrizal Friska Anggia Nurlita Sari Haidar Arijuddin Harun Ulum Fajar Hendra Danu Laksana I Gede Wahyu Sanjaya Iskar Maulana Jodi Chris Jordan Sihombing Jogi Oliver Yohanes Tampubolon Kasyful Amron Kasyful Amron Kevin Jonathan Harnanta Khabban Sayyidi Razin Surya Kusnul Aeni Labib Imam Hidayat Lius Alviando Mahendra Data Mercury Fluorida Fibrianda Moch. Wildan Habibi Mochammad Hannats Hanafi Ichsan Moh Wildan Habibi Moh. Afif Ma'ruf Mohammad Harits Mohammad Zulfikar Muhammad Abdul Aziz Muhammad Aji Guna Darmawan Muhammad Chalif Nurfaizi Muhammad Fahmi Ali Fikri Muhammad Fauzi Muhammad Gigih Wicaksono Muhammad Hasbi Ash Shiddieqy Muhammad Irfan Syafi'i Muhammad Misbahul Munir Muhammad Rafi Fauzan Fathin Nico F. Sitorus Nimas Raya Ahsy Nur Fauzi Nuretha Hevy Purwaningtyas Ocki Bagus Pratama Ocki Bagus Pratama Pramukantoro, Eko Sakti Primantara Hari Trisnawan Rakhmadhany Primananda Refri Rifwan Daharmi Regita Yustania Esyaganitha Rembulan Suci Fii Jannatin Reza Andria Siregar Richad Gilang Wisduanto Riski Ananda Rizal Bayu Aji Pradana Rizky Haryandi Rahman Rizky Putra Pratama Sabit Ihsan Maulana Sabriansyah Rizqika Akbar Santoso, Bagus Jati Sapta Oryza Putra Sara Yosephina Satria Adhi Kharisma Satria Adi Kharisma Sofyan Ainurrachman Sukma Alamsyah Budianto Tsany Afif Wian Virgi Widasari, Edita Rosana Widhi Yahya Yosef Hesekiel Partogi