Claim Missing Document
Check
Articles

Found 9 Documents
Search
Journal : JURNAL ILMIAH INFORMATIKA

PENERAPAN WEB PROXY DAN MANAGEMENT BANDWIDTH MENGGUNAKAN MIKROTIK ROUTERBOARD PADA KANTOR POS PALEMBANG 30000 Tamsir Ariyadi; A Taufan Maulana
JURNAL ILMIAH INFORMATIKA Vol 9 No 02 (2021): Jurnal Ilmiah Informatika (JIF)
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v9i02.4444

Abstract

The Palembang 30000 POS office which is supported by information technology has a computer network that is directly connected to the ISP (Internet Service Provider) which has a bandwidth allocation of 20 Mbps. The problem at the Palembang 30000 POS Office is that there is no web proxy and Bandwidth Management application, so employees can access various sites that interfere with employee performance and employees who use the internet for free result in uneven bandwidth usage. The purpose of this study is to implement a web proxy and bandwidth management, so that the bandwidth is evenly distributed, therefore it is necessary to divide the bandwidth using a proxy routerboard, the method used for bandwidth distribution is using the simple queue method. By implementing a web proxy, it can control internet usage and block website sites that have the potential to interfere with employee performance, by making bandwidth management able to limit bandwidth usage and share bandwidth equally on each client, so internet access is now running more stable.
Analisis ANALISIS COVERAGE AREA JARINGAN 4G LTE TELKOMSEL, XL AXIATA DAN INDOSAT OOREDOO DI KECAMATAN BAYUNG LENCIR, KABUPATEN MUSI BANYUASIN, PROVINSI SUMATERA SELATAN. Tamsir Ariyadi; Ariyudi Ariyudi
JURNAL ILMIAH INFORMATIKA Vol 10 No 02 (2022): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v10i02.6358

Abstract

The research is to analyze the coverage area of ​​the 4G LTE network of telecommunications operators Telkomsel, XL Axiata, and Indosat Ooredo in Bayung Lencir District, Musi Banyuasin Regency, South Sumatra Province, Indonesia. The information obtained by the result of this research is expected to be useful for the public to determine and choose a telecommunications operator that has the widest coverage area and is a catalyst for improvement for telecommunications operators whose coverage area is not yet wide. This study will analyze the parameters of the 4G LTE network coverage area, namely: Reference Signal Received Power (RSRP) and Signal to Noise Ratio (SINR), on the 4G LTE network. The aim of this study to analyze the coverage area of ​​the 4G LTE network of Telkomsel, XL Axiata and Indosat Ooredoo in Bayung Lencir District, Musi Banyuasin Regency, South Sumatra Province using the G-NetTrack Pro application. The study was conducted in 9 villages/kelurahan in Bayung Lencir District, Musi Banyuasin District, South Sumatra Province. The results of the measurement of the coverage area parameters using the G-NetTrack Pro software were then analyzed statistically with the Single Factor Analysis of Variance. The results of the study, that  find RSRP and SINR parameters for cellular operators Telkomsel, XL Axiata, and Indosat Ooredoo, it was found that statistically the RSRP value between operators was not significantly different, which means that the RSRP values ​​for Telkomsel, XL Axiata, and Indosat Ooredoo were considered the same and the SINR parameter for operators Telkomsel, XL Axiata, and Indosat Ooredoo are statistically different where the SINR value of Telkomsel is the highest, followed by Indosat Ooredo at position number 2, and XL Axiata at position 3.
Analisis ANALISIS SERANGAN DHCP STARVATION ATTACK PADA ROUTER OS MIKROTIK Tamsir Ariyadi; Aidil Nur Riyansyah; M Agung; M. Alzi Ikrar
JURNAL ILMIAH INFORMATIKA Vol 11 No 01 (2023): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v11i01.7162

Abstract

Dynamic Host Configuration Protocol (DHCP) is a client-server protocol that functions to provide IP addresses to client computers/network devices automatically. In using the Mikrotik OS, do further analysis regarding the attack on the DHCP starvation attack. Where the attacker will become a host on one of the computers and request an IP to the proxy OS to obtain the client's personal information which will then be recorded and analyzed for the Man in the Middle attack. Of course, this can be prevented by the filtering techniques available on the miktorik OS. Of course this can be prevented by the filtering techniques that exist on the proxy OS. The key can be seen on the hostname computer that is registered on the proxy, so that in the DHCP Discover process which asks for an IP on the proxy DHCP Server, if the hostname is not registered, it will be listed as Dynamic Host Configuration Protocol (DHCP), which is a client-server protocol that functions to provide IP addresses to client computer/network device automatically. In using the Mikrotik OS, do further analysis regarding the attack on the DHCP starvation attack. Where the attacker will become a host on one of the computers and request an IP to the proxy OS to obtain the client's personal information which will then be recorded and analyzed for the Man in the Middle attack. Of course, this can be prevented by the filtering techniques available on the miktorik OS. Of course this can be prevented by the filtering techniques that exist on the proxy OS. The key can be seen on the hostname computer that is registered on the proxy, so that in the DHCP Discover process which asks for an IP on the proxy DHCP Server, if the hostname is not registered, it will be listed for blocking.
IMPLEMENTASI DESAIN JARINGAN HOTSPOT BERBASIS MIKROTIK DENGAN METODE NDLC (NETWORK DEVELOPMENT LIFE CYCLE) PADA PT KIRANA PERMATA Tamsir Ariyadi; Timur Dali Purwanto; Muhamad Malik Fajar
JURNAL ILMIAH INFORMATIKA Vol 11 No 02 (2023): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v11i02.8032

Abstract

In this technological development the need for the internet is no longer a foreign thing for the community. With the internet that can connect to each other between one network to a number of networks in the world. Internet use cannot be separated from the existence of the internet service provider itself. To be able to connect to the internet network, a Hotspot facility is needed as a connectivity connecting access to the internet network. The purpose of this study is to design a Hotspot network to increase the efficiency of using computer networks at PT Kirana Permata. In designing this network design using the NDLC method which can be used as a development of network infrastructure to be more optimal. So that the system can run optimally, settings are made on the routerboard which is used as an internet connection from the ISP to the internet user network. For this reason, a network topology that has been designed to be implemented on PT Kirana Permata's computer network is used. So it is hoped that the network topology design can make computer networks more structured. Even so, monitoring still needs to be done to observe data traffic as a network monitor so that it can run as smoothly as expected. This network design plan produces a new network topology that is more efficient and flexible. With the Hotspot network at PT Kirana Permata, the use of the internet network is more accessible for guests and employes.
ANALISIS KEAMANAN JARINGAN WIFI MAHASISWA UBD DARI SERANGAN PACKET SNIFFING ARIYADI, TAMSIR; Irwansyah, Irwansyah; Huda Mubarok, M. Syaiful
JURNAL ILMIAH INFORMATIKA Vol 12 No 01 (2024): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v12i01.8739

Abstract

The wifi network of Bina Darma University is open to potential attacks by hackers, as they are unavoidably carried out. Network security is the act of recognizing and blocking unwanted users, or intruders, from computer networks. It serves as a safeguard for a network system against unauthorized and careless network users. In this study, the "Experiment Method" is employed. One approach that seeks to both test and explain an event is the experiment technique. Using the tools ettercap and wireshark, tests on network security were run and the findings analyzed for this study. The study's findings show that the network security encryption utilized at Bina and the security mechanism on the ubd student wifi network are both in good working order.
PENERAPAN MONITORING JARINGAN DENGAN ZABBIX PADA PT. PLN (PERSERO) UIP BAGIAN SUMBAGSEL Ariyadi, Tamsir; Fikri, Muhammad; Irwansyah, Irwansyah; Yudiastuti, Helda
JURNAL ILMIAH INFORMATIKA Vol 12 No 02 (2024): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v12i02.9283

Abstract

PT PLN (Persero) UIP SUMBAGSEL, as a government company in the energy sector, faces challenges in ensuring reliable and efficient internet network access for employees. The lack of a monitoring system that assists administrators in monitoring network devices causes difficulties in ensuring consistent device status and connectivity. Zabbix is an open-source software for network monitoring, offering an effective solution to monitor network performance and detect problems in real-time. This research aims to design and implement a network monitoring system using Zabbix at PT PLN (Persero) UIP SUMBAGSEL. The research method used is Network Development Life Cycle (NDLC), which includes the stages of analysis, design, simulation, implementation, monitoring, and management. The results showed that Zabbix is able to detect Mikrotik devices connected to the network and monitor device performance, such as network traffic and memory usage. In conclusion, the implementation of monitoring with Zabbix is effective for monitoring the availability of network devices, which is expected to increase operational efficiency and productivity at PT PLN (Persero) UIP SUMBAGSEL.
ANALISIS MONITORING UNTUK PENCEGAHAN AKSES ILEGAL DI DALAM JARINGAN DEPARTEMENT TI PT. PUSRI Ariyadi, Tamsir; Ikrar Agamuri, M.Alzi; Wiratama, Rahmat; Kholid, Dasril
JURNAL ILMIAH INFORMATIKA Vol 13 No 01 (2025): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v13i01.9915

Abstract

Technology plays an important role in human survival in daily activities that cannot be separated from technology. Information technology makes it easy for humans to share information or search for information. Cyber ​​attacks such as malware attacks or hacking attempts are a serious threat to IT networks. The purpose of network security is to anticipate the risk of network threats that can disrupt daily computer network operations. In this study, the author used the Action Research method. This study aims to test and develop, find and design. The network in the IT Department of PT. Pupuk Srwidjaja Palembang is quite safe because when network monitoring was carried out for 10 days on June 6, 2023 to June 22, 2023, there was no illegal access.
RANCANG BANGUN SISTEM LOKER OTOMATIS MENGGUNAKAN QRCODE DAN LAMPU UV DISINFEKTAN Estrada, Novesel; Rafli Pratama, Muhammad; Ariyadi, Tamsir
JURNAL ILMIAH INFORMATIKA Vol 13 No 01 (2025): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v13i01.9923

Abstract

As technology advances, the level of intelligence in humans increases, so humans always want to create progressive innovations, but besides that, it can also give rise to crime in society. Therefore, security aspects are very much needed in various sectors of life today. One of them is the locker security system which can influence criminal acts. A locker is a place for storage that usually has a lock, which is used to store or place valuable items. One of the facts is that there is often theft and loss of items at places where lockers are rented or borrowed. Thieves can easily open the locker lock using a piece of wire or other artificial keys. This research designs and builds a locker door security system consisting of QRcode sensors, solenoid locks, UV lights, Arduino and other sensor devices. The result of this research is an implementation of a locker security system that can open and close locker locks automatically using Arduino Uno which can provide automatic lock security with a better level of security such as the use of an automatic lock that uses a QRcode scan sensor which only the owner can open by pasting the QRcode code, and additional automatic locks such as a password keypad to open the locker.
RANCANG BANGUN PROTOTYPE SISTEM PROTEKSI MOTOR DC BERBASIS MIKROKONTROLER DENGAN NOTIFIKASI TELEGRAM Al Baihaqqi, Difa; Paramytha, Nina; Fitriani, Endah; Ariyadi, Tamsir
JURNAL ILMIAH INFORMATIKA Vol 13 No 01 (2025): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v13i01.9940

Abstract

CTP / CTCP machine which is a machine used in the printing industry that functions to make printing plates. CTP (Computer to Plate) CTCP (Computer to Conventional Plate). Continuous usage of this machine may cause the vacuum blower motor to overheat and shut off, which could impede the creation of printing plates and ultimately halt output. The performance of the machine can be enhanced by using protective system technology on the vacuum blower motor. By using microcontroller Node MCU ESP 8266 as control system, using a DS18B20 as temperature sensor, two fan as cooler, PZEM 017t as voltage and current monitoring motor, LCD 16x2 as display showing the values of current, voltage, DC motor temperature, DC motor speed control, and telegram to monitoring system realtime. The research’s output is a prototype that uses a DC motor as vacuum blower motor for monitoring and cooler if the DC motor temperature reaches a certain point, it will automatically notify the user via a chatbot (Telegram). So that when used with the plate printing machine, it can subsequently aid in improving output results.
Co-Authors A fahlevi Hadist A Taufan Maulana Aan Restu Mukti Aan Restu Mukti, Aan Restu Ade Putra Adina, Gita Afandri, Willian Ahmad Agung Saputra Ahmad Lega Aidil Nur Riyansyah Al Baihaqqi, Difa Alfarizhi, Reyhan Achmad Alfyuddin, Moh Rizki Andri Agus Salim Anggraeni, Marisa Anwar, Muhammad Robby Arik Putra Pratama Ariyudi Ariyudi Assalafi, Fawwaz Astri, Seli Bagus Setiawan Bintang, Muhammad Yuan Cahya, Vicky Dwi Dani, Ilham Darwin Darwin Dasmen, Rahmad Novrianda Dastin Dimas Surya Rahmadani Dwi Pertiwiningsih Efansyah, Teguh Efransa, Didi Eggy Saputra EKA NOVITASARI Eko Fajar Cahyadi Elfrida Ratnawati Endah Fitriani Erwinsyah Erwinsyah Estrada, Novesel Fahrudin, Muhammad Faisal, M Imam Fatoni Fatoni, Fatoni Febriani Sasti Kirana Februri, Aldi Februri, Muhammad Aldi Fitriani Ibrahim Fitriani, Endah H. Mukran Roni, H. Mukran Hadi, M. Khairul Hafizh, Ahmad Hari Yudho Prabowo Hartini Hartini Heru Saputra Hery Setiawan, Hery Hidayatul Fadli Huda Mubarok, M. Syaiful Hutami, Peni Ikrar Agamuri, M.Alzi Ilham, Firgi Anto Irfansyah, Yovi Fajar Irham Irham Irwansyah Irwansyah IS, Nina Paramytha Jemakmun, Jemakmun Juliansyah, Rizki Jumadil, Hanif Junianto Kasim, Ali Kasim, Ali Kazuya, A. Sayuti Kholid, Dasril Khudri, Akhmad Komalasari, Dinny Kundari Kurniawan, Djeysen Lubis, Abdullah Syafei M Agung M Dimas Putra M. Alzi Ikrar M. Ilham Septariansyah M. Ridho, M. Ridho Makmuri, M. Kumroni Maria Ulfa Maulana, Try Yudha Meria, Desi Mgs M Nur Arromadhani Muhamad Agung Prabowo Muhamad Malik Fajar Muhammad Bimo Prihandoko Muhammad Fikri Muhammad Kevin Al Kautsar Muhammad Nadifh Muhammad Tio Farizky Nely Apriyanti Nina Paramitha Nina Paramytha Nugroho, Yoga Pratama Nuriansyah, Muhammad Arya Paramita, Nina Paramitha IS, Nina Paramitha, Nina Paramyta, Nina Paramytha , Nina Paramytha, Nina Permata, Sindi Pohan, M. Rizky Prabowo, Hari Yudho Prawira, Wanda Yudha Purwanto, Timur Dali Putra Pura, Calvin Bernandra Putra, Abriansya Rafli Pratama, Muhammad Rahmadan, Eno Raihan, M. Ramadhan, Muhammad Andre Rangga YP, M. Rasmila Rosyad, Farlin Roy Jordi Sabeli Aliya Salsabila, Andini Putri Saputra, Deo Saputra, Muhammad Rama Sari, Diah Novita Suryayusra Suryayusra Suyanto Suyanto Syafi'ul Hamidani SYAH, JENIO MULIA Tantri Langgeng Widodo Tari Syah Putra Taufik Akbar Timur Dali Purwanto Valupi, Christine Vanisa Dwi Agustina Wanda Yudha Prawira wardani, kiky rizky nova Widodo, Ahmad Anwar Wijaya, Alek Wildan Maula Wiratama, Rahmat Wydyanto Wydyanto, Wydyanto Yudiastuti, Helda Yulian, Akhmad Rizki