Rakhmadhany Primananda
Fakultas Ilmu Komputer , Universitas Brawijaya

Published : 151 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Analisis Performa Protokol 802.11n Pada Mikrokomputer Raspberry Pi Retno Perwita Sari; Kasyful Amron; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 12 (2017): Desember 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (793.041 KB)

Abstract

The need for better infrastructure development to support human resources (HR) needs to be done. One of the important infrastructure is the information technology infrastructure in the field of telecommunication. Adequate telecommunication facilities are expected to help rural areas. One of the way is with wireless technology. Wireless technology has advantages in easy installation and cheap because it does not need a cable. Wireless technology can be implemented in the form of wireless mesh with the selection of the 802.11 as a wireless protocol because it supports multiple devices and has a wide range. It is also necessary routing protocol in this research that is OLSR. OLSR to be selected due to the OLSR work concept that always updates the routing table at any times. Choosing Raspberry Pi for microcomputer due to wifi requirement that must be available that can not be given by microcontroller like arduino. Once a facility is established, a performance test is required to determine the performance of the protocol and the microcomputer used in accordance with the field conditions. Parameters in the performance testing protocol 802.11 and Raspberry Pi is packet loss, delay, throughput, CPU and memory usages. From the test results showed that the highest packet loss reached 0.38% when the measured data is the largest data in this study that is 65507 B. Highest delay reached 1.09 second while the experiment with a large data 32768 B, the largest throughput reached 64.13 Bps on the largest data is 65507 B, CPU usage is only 0,5% and memory that not exceed than 0,8% of total CPU resources available.
Analisis Performa Sistem Pemantauan Suhu Dan Kelembaban Berbasis Wireless Sensor Network Da'imul Royan; Rakhmadhany Primananda; Wijaya Kurniawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 12 (2017): Desember 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1188.194 KB)

Abstract

Utilization of more adequate technology to support agricultural resources needs to be done. One of the technologies required is a temperature monitoring system and humidity based wireless sensor network environment with good performance to give a comparable value to the observed parameters premises. There are many sensor devices that serve to measure temperature and humidity, accuracy is one of the parameters that can be used to determine it. Once the selected component requires delivery scheduling method with time division to avoid the possibility of data transmission collision, time synchronization is required to support scheduling method. After the facility is formed, it is necessary to conduct performance tests to determine the performance of the system whether in accordance with field conditions. Parameters in system performance testing are system functionality, sensor response to temperature and humidity changes, sensor accuracy comparison in variations of time period of use on farmland, comparison of delivery delay in variation of distance between nodes and RAM usage. From the test results show that all the functionality of the system can work well with a 100% success percentage. DHT11 has a response time of 10.4 seconds - 10.9 seconds each for temperature and humidity measurements, the large range of values influences the temperature reader. DHT11 has a relative error range of 1.2 - 1.5% and 5.6 - 6.3% respectively for temperature and humidity measurements, duration of use has no effect on accuracy. The system has the largest delivery delay at a distance of 70m node is 19μs, the more distant the resulting delay the greater. The largest use of RAM reached 47% when sending messages on sensor nodes.
Implementasi Light Painting Photography Dalam Analisis Cakupan Jaringan Wireless LAN Menggunakan Perangkat Berbasis Wemos D1 Wisnu Fajar Dewantara; Sabriansyah Rizqika Akbar; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 1 (2018): Januari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1444.659 KB)

Abstract

Wireless technology makes any devices can be connected without wire that limiting the range. We need an optimal placement and configuration of the access point for optimal coverage reasons. Signal strenght from access point does effect to a connection quality. Nowadays network analyst are using a network coverage analyzer software called Ekahau Heatmapper. It uses heatmap method to mapping network coverage. The software analyzes RSSI's (Received Signal Strenght Indicator) value then the value into a range. Each range is represented by color that signs the strenght of wireless signal. But its procedure should be awkward for some reason. You need to draw a sketch of the room that you want to analyze. Then you must bring your laptop to track around the room. Wi-Spec offers an alternatives with a same method based on heatmap that Ekahau Heatmapper does. Wi-Spec is a device using Wemos D1 as it's microcontroller with RGB Led Strips as output. We combine this method with light painting photography using a photo as frame makes the result is more real and accurate than info from 2D sketch that Ekahau does. Wi Spec compatible with Arduino IDE using ESP8266Wifi.h and FastLED.h. FasLED.h library features predifined color that can subtitute the heatmap color from Ekahau Heatmapper. These colors are : Green, Lime, , Yellow, Orange, Red, and running dot red light while it hasn't receive signal.. From the SSID and RSSI capability test, the device can't get the SSID and RSSI from a hidden configured SSID. Differences of wireless receivers beetween implementation caused a different result on one of an area point.
Implementasi MQTT (Message Queuing Telemetry Transport) pada Sistem Monitoring Jaringan berbasis SNMP (Simple Network Management Protocol) Akbar Pandu Segara; Rakhmadhany Primananda; Sabriansyah Rizqika Akbar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 2 (2018): Februari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1038.2 KB)

Abstract

The growing use of current information technology users, monitoring system is needed to facilitate network administrators to monitor the devices connected in a computer network. Currently network monitoring systems generally display information by polling device data every few minutes. This causes the administrator don't know as early as possible if something happens to the device being monitored. This study developed an SNMP based network monitoring system by implementing MQTT. MQTT uses the principle of publish-subscribe to communicating. MQTT is used because power-saving and lightweight messaging protocol. This research produces a network monitoring system which can monitored device information like CPU, load, and memory periodically and display it in graphical form and table in web interface. System development with implementing SNMP agent on monitored device and SNMP manager on NMS Server as publisher. Manager requested information to agent every 2 seconds. On the client side is implemented a subscriber to subscribe published data by manager and then processed on the web-based interface. From the test results show the processing time data by the server and client takes an average time of 2.029 seconds. For data processing time from server to client takes an average time of 1.210 seconds.
Analisis Load Balancing Pada Web Server Menggunakan Algoritme Weighted Least Connection Dany Rahmana; Rakhmadhany Primananda; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (739.552 KB)

Abstract

Load balancing is a technique to divide the workload on 2 or more servers when there is a request from the client. In load balancing techniques there are several algorithms,, others: least connection, weighted least connection and others. This research uses weighted least connection algorithm. The weighted least connection algorithm divides the server load based on the weight value. The supporting tool for load balancing is IPVSADM with Piranha interface. In the test, the measured parameters are throughput, response time and CPU usage. The tool used in the test in httperf. From the test results with delivery of 10000 connections obtained by sending connections per second more will increase the throughput value. On testing the highest throughput value is 547,74 KB / s. Compared with the response time response, if given a high connection will be higher in the sense of slowing down. In connection distribution testing, the server with the highest weights accommodates more connections of 4000 connections, the lowest weight of 1000 connections from the total 10000 connections. In CPU usage testing, the weighted least connection algorithm is at least better than the least connection algorithm when applied to a heterogeneous server.
Analisis Perbandingan Dampak Serangan Black Hole pada Peformansi Protokol Routing OLSR dan AODV di Jaringan Wireless Mesh Network Wian Virgi; Adhitya Bhawiyuga; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1441.322 KB)

Abstract

Wireless Mesh network (WMN) is a set of wirelessly connected nodes forming a mesh topology. Over the WMN, the process of transmitting data information requires a path to get to the destination node, namely reactive protocol and proactive protocol. Security wise, routing protocols are still vulnerable to various forms of attack, especially against active attacks that can destroy, modify and deleting not only data but also the information within. Based on the said problems, the writer decided to make a research called Comparative Impact Analysis of Black Hole Attack on the Performance of OLSR and AODV routing Protocols in Wireless Mesh Network's Network. The results obtained in this study is that the black hole attack does affects the performance of AODV and OLSR routing protocols. The test was done using OMNET++ with three test scenarios, that is to say, without-attack; with multiple-attack nodes; and with big-probability of attack. Test parameters include throughput, end-to-end delay, packet loss and packet delivery ratio. The result of research using 18 nodes of attacker showed that packet loss on OLSR is higher than AODV which is proved by the highest packet loss result in AODV that only has 99.33% while OLSR has 99,50%.
Implementasi Algoritme Grain V1 Dan 128 Bit Pada Arduino Mega 2560 Ajeng Nurrohmah; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1266.068 KB)

Abstract

Technology developments demanded cutting-edge data security systems, especially on hardware systems. NIST (National Institute of Standard Technology) is an institution that oversees data security standards. NIST organized an eSTREAM project to search for new stream cipher algorithms for various hardware and software application profiles. The algorithm chosen for hardware is the grain algorithm. Grain algorithm is superior because the architecture has a complex level of complexity so that the level of security is higher. The algorithm has two versions v1 and 128 bit. This research tells how to use grain algorithm to secure data on hardware side applied to arduino mega. Researchers chose arduino mega due to the use of this microcontroller in the IoT and there is no update data security using the latest stream cipher. Conducted 3 stages of testing that is validation test vector, performance analysis between grains through the execution time keystream and data encryption and decryption. This research yielded keystream validation in accordance with test vector. The results were analyzed using Independent t-test statistic test, with the result of Sig's keystream execution time. 0.662 then there is no significant difference in the performance of grain algorithm v1 and 128. While the results of the execution time of encryption and decryption of both algorithms also have no significant differences, indicating that arduino mega has a stable performance in running both algorithms.
Analisis Kinerja Pengiriman Data Modul Transceiver NRF24l01, Xbee dan Wifi ESP8266 Pada Wireless Sensor Network Upik Jamil Shobrina; Rakhmadhany Primananda; Rizal Maulana
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1026.325 KB)

Abstract

WSN technology is the latest technology that still has many obstacles related to programming or real-time communication needs. Challenges related to real-time communication include the system must be able to adapt to the environment and noise as well as to the delay time that occurs when sending data. Therefore this research performs analysis of communication device (transceiver) which is the core of WSN node with delay test parameter, RAM memory usage and functional system test. The transceiver modules used are nRF24L01, Xbee S2 and ESP8266. This research is done by designing two nodes as sender and one receiving node. Data delivery is derived from the ADXL335 accelerometer sensor. The sending and receiving data is done simultaneously using RTC (Real Time Clock) module with send and receive time 0, 15, 30, and 45 seconds. From the test results show that nRF24L01 module is superior in terms of packet delivery and xbee has less noise and data collision, while esp8266 data packet received a lot of noise and data collision. In the delay parameter, xbee has the smallest range of 0.90 seconds to 1.09 seconds. For average memory usage on nRF24L01 over 32.00% of RAM capacity, xbee is more than 40.00% of RAM capacity and ESP8266 is more than 55.00% of RAM capacity.
Implementasi Algoritme Grain V1 Dan 128 Bit Pada Raspberry PI Syahifudin Shahid; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1312.241 KB)

Abstract

NIST (National Institute of Standard Technology) is the institution that regulates data security standards. NIST held a project called eSTREAM to update old outdated stream ciphers. The grain algorithm is selected as a security algorithm on the hardware side and replaces the previous stream cipher. Grain algorithm has 2 versions, 80 bit and 128 bit. Security at the hardware level is also required to keep information data. With the update of security standards from NIST, this research is conveying the idea to utilize the grain algorithm for data security that will be implemented in raspberry pi. This study chose raspberry pi due to the large use of this mini PC in the Internet of Things and there is no update data stream cipher security. Raspberry pi that has been implemented with grain will do 3 testing that is test of keystream validation with test vector, time of execution process of IV and Key to produce keystream and encryption and data decryption. The test of execution time, will be analyzed using Independent t test test, the result of testing of keystream execution time on grain v1 and 128 algorithm is -2,146 with probability (Sig.) 0,000 indicates a significant difference, as well as with execution time of 8, 12 and 16 bit encryption and decryption. This research concluded raspberry pi performance for both stable versions.
Distribusi Topik Skripsi Mahasiswa Berbasis Android Dengan Mekanisme Publish/Subscribe Di FILKOM Universitas Brawijaya Gibran Haq; Rakhmadhany Primananda; Lutfi Fanani
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1301.683 KB)

Abstract

In the undergraduate program to take the final exam, a student is assigned to make the final task in the form of a thesis. In making this thesis a student first determine the topic to find the problem to be lifted. Problems that exist, final year students still difficult to determine the topic of thesis in the final project. Therefore some lecturers provide certain kinds of topics according to their field of expertise which are then published on the website. That way the student must often visit the website to see the latest topics that have been published by lecturers. And students also have to search for topics one by one according to the topic he wants. This is not efficient enough if students should frequently visit the website and search for topics one by one according to the topic to be discussed considering not knowing the time of publication of the latest thesis topic and not classified topic of thesis based on topic. With the mobile app using the Publish / Subscribe method the student will be more efficient in getting the latest thesis topic information and according to the desired topic. Based on the results of functional and non functional tests concluded to run as expected. Results from functional testing with 100% validation rate. While the result of non-functional testing is the time required to send messages from publisher to subscriber using QoS 0, QoS 1, QoS 2 is 0.490 seconds , 0.561 seconds, 0.720 seconds.
Co-Authors Abimanyu Sri Setyo Abraham Arya Satyana Achmad Basuki Adhitya Bhawiyuga Aditya Geraldo Aditya Hermawan Aditya Prayudhi Agiya Yoshua Agung Setia Budi Ahdi Hudaya Ahmad Fajri Rahman Ahmad Faris Adhnaufal Ahmad Fikri Marzuqi Ahmad Ghufron Agustian Ajeng Nurrohmah Akbar Pandu Segara Alfrienza Tighfaraka Alifibioneri Ali Ali Ammar Waliyuddin Jannah Andi Yudiko Leonardo Solin Andre Ananda Pratama Andre Rizki Haryuaditya Andrean Dwi Andaru Andreas Widyatmoko Anggit Surya Gumilang Aprilia Kartika Sriastunti ari kusyanti Arief Indra Rivaldy Permana Arief Sukma Indrayana Arif Rahmanto Arya Sena Marga Mukti Asroful Khusna Arifianto Aswin Suharsono Aulia Nabih Rizqullah Bagas Gerry Caesario Bagos Wahyu Suprayugi Baiq Findiarin Billyan Bambang Gunawan Tanjung Bayu Bagus Prabowo Bella Aulia Rahmataufany Brillian Taufan Budiyanto Budiyanto Cakra Bhirawa Chrisyantar Hasiholan Da'imul Royan Dahnial Syauqy Damianus Dewa Pratama Daniel H. Simatupang Dany Primanita Kartikasari Dany Rahmana David Isura Dedy Andrean Ardiansyah Dedy Tinovrasibo Nababan Desy Ulina Purba Dhani Wahyu Wijaya Dimas Malik Ibrahim Edgar Juvianno Santoso Eka Putri Aprilianingsih Eko Aditya Ramadianto Eko Setiawan Enggar Saka Dirgantara Erricson Bernedy Setiawan Fadila Rafi Alifiandi Fahmi Ardiansyah Faizal Ramadhan Fajra Rizky Faris Naufal Al Farros Fariz Andri Bakhtiar Fathia Ningtyasari Aroeboesman Feriz Pradibya Uditama Fikri Miftah Akmaludin Firza Nur Hibatullah Fitriyah, Hurriyatul Frans Muliawan Panjaya Galeh Fatma Eko Ardiansa Galih Bhaktiar Candra Getdra Saragih Sumbayak Gibran Haq Giservin Tifira Zain Hafizhul Karim Helmy Rafi Nawawi Heri Setiawan Heru Nurwarsito Heru Nurwasito Hidayatus Syafa'ah Holden Gunawan Hudan Abdur Rochman I Putu Krisna Yoga Tanaya Igo Vicky Firmandia Ira Oktavianti Irfani Fadlan Irvan Ramadan Irvan Wahyu Bagus Pratama Irvana Alfiyan Nur Irwan Primadana Mulya Izaaz Waskito Widyarto Jefri Muhrimansyah Jenrinaldo Tampubolon Jodi Prayoga Wahyudwi Kasyful Amron Kevin Charlie Kurnia Ade Prasetia Laisa Ryry Pudja Mentari Lastio Irfathan Ananda Lucky Ronny Chandra Negara Lutfi Fanani Lyna Dwi Maryati M Ilham Fadilah Akbar M. Ammar Batistuta Haryawan Mabda Amnesti Hananto Mahendra Data Moch. Wahyu Imam Santosa Mochamad Hannats Hanafi Ichsan Mochammad Hannats Hanafi Ichsan Moh Irfan Haris Mohamad Ilham Firdaus Mohamad Lutfi Muhammad Afian Musthofa Muhammad Alfarizi Muhammad Fachri Hasibuan Muhammad Farradhika Muntaha Muhammad Fattah Na'im Pang Ripto Muhammad Hannats Hanafi Ichsan Muhammad Mahar Jahary Muhammad Naufal Aziz Huryansyah Muhammad Nursodik Wicaksono Muhammad Rasyid Perdana Muhammad Reza Wahyu Chrisdyan Muhammad Risyat Nashrullah Muhammad Sabilillah Mukhamad Roni Nugraha Pangestu Nur Cahyo Utomo Nuril Huda Pramudya Mahardika Kusumawardhana Pramukantoro, Eko Sakti Prastise Titahningsih Primantara Hari Trisnawan Putri Ayu Delina Sari Putri Rizqia Hardein Rendyanto Adi Kurniawan Resya Wakhid Ardiansyah Retno Perwita Sari Reynald Novaldi Reza Andria Siregar Rifki Pinto Hidayat Risailin Dwi Jaka Fauzi Riza Anisul Fu'ad Rizal Maulana Rizqi Agung Dwi Nugraha Sabriansyah Rizqika Akbar Salsabila Salsabila Sastra Ginata Satria Kencana P. Kacaribu Selma Aulia Sekarrizky Shindy Maria Ulfa Siwi Rahmat Januar Suhadak Akbar Sultan Achmad Chidir Fajar Sutikno Sutikno Syahifudin Shahid Syahmi Rifqi Hudha Perwira Syifaul Hud'riyah Tugar Aris Andika Prastiyo Raharjo Upik Jamil Shobrina Vico Andrea Budi Harto Wahyu Pria Purnama Wian Virgi Widasari, Edita Rosana Widhi Yahya Wijaya Kurniawan Wisnu Fajar Dewantara Yefta Kristiyanto Yemima Dara Gloriawati Yugi Trilia Septiana Zaky Farsi