Articles
Analisis Performa Protokol 802.11n Pada Mikrokomputer Raspberry Pi
Retno Perwita Sari;
Kasyful Amron;
Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 12 (2017): Desember 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (793.041 KB)
The need for better infrastructure development to support human resources (HR) needs to be done. One of the important infrastructure is the information technology infrastructure in the field of telecommunication. Adequate telecommunication facilities are expected to help rural areas. One of the way is with wireless technology. Wireless technology has advantages in easy installation and cheap because it does not need a cable. Wireless technology can be implemented in the form of wireless mesh with the selection of the 802.11 as a wireless protocol because it supports multiple devices and has a wide range. It is also necessary routing protocol in this research that is OLSR. OLSR to be selected due to the OLSR work concept that always updates the routing table at any times. Choosing Raspberry Pi for microcomputer due to wifi requirement that must be available that can not be given by microcontroller like arduino. Once a facility is established, a performance test is required to determine the performance of the protocol and the microcomputer used in accordance with the field conditions. Parameters in the performance testing protocol 802.11 and Raspberry Pi is packet loss, delay, throughput, CPU and memory usages. From the test results showed that the highest packet loss reached 0.38% when the measured data is the largest data in this study that is 65507 B. Highest delay reached 1.09 second while the experiment with a large data 32768 B, the largest throughput reached 64.13 Bps on the largest data is 65507 B, CPU usage is only 0,5% and memory that not exceed than 0,8% of total CPU resources available.
Analisis Performa Sistem Pemantauan Suhu Dan Kelembaban Berbasis Wireless Sensor Network
Da'imul Royan;
Rakhmadhany Primananda;
Wijaya Kurniawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 12 (2017): Desember 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1188.194 KB)
Utilization of more adequate technology to support agricultural resources needs to be done. One of the technologies required is a temperature monitoring system and humidity based wireless sensor network environment with good performance to give a comparable value to the observed parameters premises. There are many sensor devices that serve to measure temperature and humidity, accuracy is one of the parameters that can be used to determine it. Once the selected component requires delivery scheduling method with time division to avoid the possibility of data transmission collision, time synchronization is required to support scheduling method. After the facility is formed, it is necessary to conduct performance tests to determine the performance of the system whether in accordance with field conditions. Parameters in system performance testing are system functionality, sensor response to temperature and humidity changes, sensor accuracy comparison in variations of time period of use on farmland, comparison of delivery delay in variation of distance between nodes and RAM usage. From the test results show that all the functionality of the system can work well with a 100% success percentage. DHT11 has a response time of 10.4 seconds - 10.9 seconds each for temperature and humidity measurements, the large range of values influences the temperature reader. DHT11 has a relative error range of 1.2 - 1.5% and 5.6 - 6.3% respectively for temperature and humidity measurements, duration of use has no effect on accuracy. The system has the largest delivery delay at a distance of 70m node is 19μs, the more distant the resulting delay the greater. The largest use of RAM reached 47% when sending messages on sensor nodes.
Implementasi Light Painting Photography Dalam Analisis Cakupan Jaringan Wireless LAN Menggunakan Perangkat Berbasis Wemos D1
Wisnu Fajar Dewantara;
Sabriansyah Rizqika Akbar;
Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 1 (2018): Januari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1444.659 KB)
Wireless technology makes any devices can be connected without wire that limiting the range. We need an optimal placement and configuration of the access point for optimal coverage reasons. Signal strenght from access point does effect to a connection quality. Nowadays network analyst are using a network coverage analyzer software called Ekahau Heatmapper. It uses heatmap method to mapping network coverage. The software analyzes RSSI's (Received Signal Strenght Indicator) value then the value into a range. Each range is represented by color that signs the strenght of wireless signal. But its procedure should be awkward for some reason. You need to draw a sketch of the room that you want to analyze. Then you must bring your laptop to track around the room. Wi-Spec offers an alternatives with a same method based on heatmap that Ekahau Heatmapper does. Wi-Spec is a device using Wemos D1 as it's microcontroller with RGB Led Strips as output. We combine this method with light painting photography using a photo as frame makes the result is more real and accurate than info from 2D sketch that Ekahau does. Wi Spec compatible with Arduino IDE using ESP8266Wifi.h and FastLED.h. FasLED.h library features predifined color that can subtitute the heatmap color from Ekahau Heatmapper. These colors are : Green, Lime, , Yellow, Orange, Red, and running dot red light while it hasn't receive signal.. From the SSID and RSSI capability test, the device can't get the SSID and RSSI from a hidden configured SSID. Differences of wireless receivers beetween implementation caused a different result on one of an area point.
Implementasi MQTT (Message Queuing Telemetry Transport) pada Sistem Monitoring Jaringan berbasis SNMP (Simple Network Management Protocol)
Akbar Pandu Segara;
Rakhmadhany Primananda;
Sabriansyah Rizqika Akbar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 2 (2018): Februari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1038.2 KB)
The growing use of current information technology users, monitoring system is needed to facilitate network administrators to monitor the devices connected in a computer network. Currently network monitoring systems generally display information by polling device data every few minutes. This causes the administrator don't know as early as possible if something happens to the device being monitored. This study developed an SNMP based network monitoring system by implementing MQTT. MQTT uses the principle of publish-subscribe to communicating. MQTT is used because power-saving and lightweight messaging protocol. This research produces a network monitoring system which can monitored device information like CPU, load, and memory periodically and display it in graphical form and table in web interface. System development with implementing SNMP agent on monitored device and SNMP manager on NMS Server as publisher. Manager requested information to agent every 2 seconds. On the client side is implemented a subscriber to subscribe published data by manager and then processed on the web-based interface. From the test results show the processing time data by the server and client takes an average time of 2.029 seconds. For data processing time from server to client takes an average time of 1.210 seconds.
Analisis Load Balancing Pada Web Server Menggunakan Algoritme Weighted Least Connection
Dany Rahmana;
Rakhmadhany Primananda;
Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (739.552 KB)
Load balancing is a technique to divide the workload on 2 or more servers when there is a request from the client. In load balancing techniques there are several algorithms,, others: least connection, weighted least connection and others. This research uses weighted least connection algorithm. The weighted least connection algorithm divides the server load based on the weight value. The supporting tool for load balancing is IPVSADM with Piranha interface. In the test, the measured parameters are throughput, response time and CPU usage. The tool used in the test in httperf. From the test results with delivery of 10000 connections obtained by sending connections per second more will increase the throughput value. On testing the highest throughput value is 547,74 KB / s. Compared with the response time response, if given a high connection will be higher in the sense of slowing down. In connection distribution testing, the server with the highest weights accommodates more connections of 4000 connections, the lowest weight of 1000 connections from the total 10000 connections. In CPU usage testing, the weighted least connection algorithm is at least better than the least connection algorithm when applied to a heterogeneous server.
Analisis Perbandingan Dampak Serangan Black Hole pada Peformansi Protokol Routing OLSR dan AODV di Jaringan Wireless Mesh Network
Wian Virgi;
Adhitya Bhawiyuga;
Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1441.322 KB)
Wireless Mesh network (WMN) is a set of wirelessly connected nodes forming a mesh topology. Over the WMN, the process of transmitting data information requires a path to get to the destination node, namely reactive protocol and proactive protocol. Security wise, routing protocols are still vulnerable to various forms of attack, especially against active attacks that can destroy, modify and deleting not only data but also the information within. Based on the said problems, the writer decided to make a research called Comparative Impact Analysis of Black Hole Attack on the Performance of OLSR and AODV routing Protocols in Wireless Mesh Network's Network. The results obtained in this study is that the black hole attack does affects the performance of AODV and OLSR routing protocols. The test was done using OMNET++ with three test scenarios, that is to say, without-attack; with multiple-attack nodes; and with big-probability of attack. Test parameters include throughput, end-to-end delay, packet loss and packet delivery ratio. The result of research using 18 nodes of attacker showed that packet loss on OLSR is higher than AODV which is proved by the highest packet loss result in AODV that only has 99.33% while OLSR has 99,50%.
Implementasi Algoritme Grain V1 Dan 128 Bit Pada Arduino Mega 2560
Ajeng Nurrohmah;
Ari Kusyanti;
Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1266.068 KB)
Technology developments demanded cutting-edge data security systems, especially on hardware systems. NIST (National Institute of Standard Technology) is an institution that oversees data security standards. NIST organized an eSTREAM project to search for new stream cipher algorithms for various hardware and software application profiles. The algorithm chosen for hardware is the grain algorithm. Grain algorithm is superior because the architecture has a complex level of complexity so that the level of security is higher. The algorithm has two versions v1 and 128 bit. This research tells how to use grain algorithm to secure data on hardware side applied to arduino mega. Researchers chose arduino mega due to the use of this microcontroller in the IoT and there is no update data security using the latest stream cipher. Conducted 3 stages of testing that is validation test vector, performance analysis between grains through the execution time keystream and data encryption and decryption. This research yielded keystream validation in accordance with test vector. The results were analyzed using Independent t-test statistic test, with the result of Sig's keystream execution time. 0.662 then there is no significant difference in the performance of grain algorithm v1 and 128. While the results of the execution time of encryption and decryption of both algorithms also have no significant differences, indicating that arduino mega has a stable performance in running both algorithms.
Analisis Kinerja Pengiriman Data Modul Transceiver NRF24l01, Xbee dan Wifi ESP8266 Pada Wireless Sensor Network
Upik Jamil Shobrina;
Rakhmadhany Primananda;
Rizal Maulana
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1026.325 KB)
WSN technology is the latest technology that still has many obstacles related to programming or real-time communication needs. Challenges related to real-time communication include the system must be able to adapt to the environment and noise as well as to the delay time that occurs when sending data. Therefore this research performs analysis of communication device (transceiver) which is the core of WSN node with delay test parameter, RAM memory usage and functional system test. The transceiver modules used are nRF24L01, Xbee S2 and ESP8266. This research is done by designing two nodes as sender and one receiving node. Data delivery is derived from the ADXL335 accelerometer sensor. The sending and receiving data is done simultaneously using RTC (Real Time Clock) module with send and receive time 0, 15, 30, and 45 seconds. From the test results show that nRF24L01 module is superior in terms of packet delivery and xbee has less noise and data collision, while esp8266 data packet received a lot of noise and data collision. In the delay parameter, xbee has the smallest range of 0.90 seconds to 1.09 seconds. For average memory usage on nRF24L01 over 32.00% of RAM capacity, xbee is more than 40.00% of RAM capacity and ESP8266 is more than 55.00% of RAM capacity.
Implementasi Algoritme Grain V1 Dan 128 Bit Pada Raspberry PI
Syahifudin Shahid;
Ari Kusyanti;
Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1312.241 KB)
NIST (National Institute of Standard Technology) is the institution that regulates data security standards. NIST held a project called eSTREAM to update old outdated stream ciphers. The grain algorithm is selected as a security algorithm on the hardware side and replaces the previous stream cipher. Grain algorithm has 2 versions, 80 bit and 128 bit. Security at the hardware level is also required to keep information data. With the update of security standards from NIST, this research is conveying the idea to utilize the grain algorithm for data security that will be implemented in raspberry pi. This study chose raspberry pi due to the large use of this mini PC in the Internet of Things and there is no update data stream cipher security. Raspberry pi that has been implemented with grain will do 3 testing that is test of keystream validation with test vector, time of execution process of IV and Key to produce keystream and encryption and data decryption. The test of execution time, will be analyzed using Independent t test test, the result of testing of keystream execution time on grain v1 and 128 algorithm is -2,146 with probability (Sig.) 0,000 indicates a significant difference, as well as with execution time of 8, 12 and 16 bit encryption and decryption. This research concluded raspberry pi performance for both stable versions.
Distribusi Topik Skripsi Mahasiswa Berbasis Android Dengan Mekanisme Publish/Subscribe Di FILKOM Universitas Brawijaya
Gibran Haq;
Rakhmadhany Primananda;
Lutfi Fanani
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1301.683 KB)
In the undergraduate program to take the final exam, a student is assigned to make the final task in the form of a thesis. In making this thesis a student first determine the topic to find the problem to be lifted. Problems that exist, final year students still difficult to determine the topic of thesis in the final project. Therefore some lecturers provide certain kinds of topics according to their field of expertise which are then published on the website. That way the student must often visit the website to see the latest topics that have been published by lecturers. And students also have to search for topics one by one according to the topic he wants. This is not efficient enough if students should frequently visit the website and search for topics one by one according to the topic to be discussed considering not knowing the time of publication of the latest thesis topic and not classified topic of thesis based on topic. With the mobile app using the Publish / Subscribe method the student will be more efficient in getting the latest thesis topic information and according to the desired topic. Based on the results of functional and non functional tests concluded to run as expected. Results from functional testing with 100% validation rate. While the result of non-functional testing is the time required to send messages from publisher to subscriber using QoS 0, QoS 1, QoS 2 is 0.490 seconds , 0.561 seconds, 0.720 seconds.