Claim Missing Document
Check
Articles

Found 6 Documents
Search

APLIKASI PERHITUNGAN IP ADDRESS DENGAN METODE SUBNETTING BERBASIS ANDROID Setiawan, Ade; Darma Astuti, Rachmawati; Mustofa, Mustofa; Dessy Susanti, Inggit
Aksara Public Vol 3 No 1 (2019): Februari 2019
Publisher : EDUTECH CONSULTANT

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Calculating IP address subentting can be difficult if the CIDR value has a large number of subnets. An example of a class A IP address has a CIDR / 17 value, so if we calculate it manually and create a table there will be thousands of tables that we cannot count one by one to get the IP subnet, initial IP, final IP and IP broadcast. Many technicians working in network computer engineering are confused in calculating IP addresses if the value of the subnet is large. Therefore the author makes the application of the IP address subnetting calculation to make it easier for network technicians, students and students. Of course this application is based on Android because Android users are also getting more and more. In making the application the writer uses indigo java based eclipse tools and design planning using UML (Unified Modeling Language)
Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky Tommi Alfian Armawan Sandi; Firmansyah, Firmansyah; Dewi, Sari; Pratama, Eka Kusuma; Astuti, Rachmawati Darma
Inspiration: Jurnal Teknologi Informasi dan Komunikasi Vol. 12 No. 2 (2022): Inspiration: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Pusat Penelitian dan Pengabdian Pada Masyarakat Sekolah Tinggi Manajemen Informatika dan Komputer AKBA Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (282.767 KB) | DOI: 10.35585/inspir.v12i2.8

Abstract

Security and stability in a network service is a top priority for a network administrator. The slightest security vulnerability can make a very big threat in the stability of network services. The rise of cybercrime that intercepts access to a network service by performing ARP spoofing to imitate a client who has the right to access the network, with this happening it can be detrimental and disrupt network services. The application of MAC Address filtering to access network services is able to minimize the occurrence of cybercrime in the network. The filtering technique used is by registering the MAC address of each network service user who will connect to the network. This technique is able to recap the MAC Address on each device in the MAC Address table and is able to block access to clients whose MAC addresses are not registered. The test results obtained for the comparison of MAC Address filtering security using Dynamic with sticky MAC addresses are that the implementation of port security static sticky is considered better than the implementation of dynamic port security, where if there is a new client trying to access the network and the client's mac address is not registered then the client absolutely does not get access to network services.
Alat Pendeteksi Kebocoran Gas menggunakan Sistem Mikrokontroler Arduino dengan Notifikasi SMS Astuti, Rachmawati Darma; Al Kautsar, Hanggoro Aji; Zumarniansyah, Ainun; Novanto, Noufal Dwi; Febriansah, Rifqi Dzaky
BEES: Bulletin of Electrical and Electronics Engineering Vol 4 No 2 (2023): November 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bees.v4i2.4283

Abstract

The use of gas can have both good and bad effects, the good effect is increasing the effectiveness of cleaner heat production and reducing the concentration of pollutants in the air. Gas cylinders that explode as a result of human error or errors in the production process of LPG gas cylinders or gas hoses should receive immediate treatment so that they do not become more dangerous and result in more victims. Efforts can be made to reduce this incident by detecting the smell of gas from leaks in gas cylinders by a gas sensor implemented by a microcontroller. How this microcontroller-based gas leak detector works in a home can be seen in the MQ-2 Sensor. If the sensor detects a gas leak (MQ-2) in the room, the buzzer will light up as an alarm that a gas leak has occurred and the Arduino will give a command to the SIM800L GSM module to send an SMS notification to the home owner's cellphone. This tool works by reading gas levels which are tested using a portable stove with a gas source via a portable gas cylinder which contains the same butane compound as the compound in LPG gas. If the gas level is detected by the mq-2 sensor, an alarm will automatically come on indicating an occurrence. gas leak in the room. then the Arduino nano orders the SIML800 GSM module to send an SMS to the home owner that there has been a gas leak in the house so that the home owner can find out and replace the hose or regulator on the gas cylinder.
Analysis of Wireless Local Area Network (WLAN) at Sirajul Falah Vocational School, Parung, Bogor Selawati, Arina; Astuti, Rachmawati Darma; Zumarniansyah, Ainun; Juningsih, Eka Herdit; Zuama, Robi Aziz
INTERACTION: Jurnal Pendidikan Bahasa Vol 11 No 1 (2024): INTERACTION: Jurnal Pendidikan Bahasa
Publisher : Universitas Pendidikan Muhammadiyah (UNIMUDA) Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36232/jurnalpendidikanbahasa.v11i1.6934

Abstract

The world of education is currently increasingly prioritizing technology in facilitating and developing the teaching and learning process, such as the Wireless Local Area Network (WLAN) at Sirajul Falah Parung Bogor Vocational School which utilizes technology and computer networks to facilitate the responsibilities and duties of staff, teachers and school principals . Wireless Local Area Network (WLAN) is a computer network that is connected using conducting media (non-cable) using frequencies and standards according to wireless network standards. This research uses observation research methods, interviews and literature studies with the aim of finding out the working system of the Wireless Local Area Network (WLAN) at Sirajul Falah Vocational School Parung Bogor and overcoming the deficiencies found such as poor security systems and user management which often results in a large number of users who illegally used the Wireless Local Area Network (WLAN) at Sirajul Falah Vocational School Parung Bogor which also caused other connection problems. One solution that can be taken to overcome the problems found is to carry out management on the Wireless network, namely activating a different username and password feature for each user who is allowed to access the Wireless Local Area Network (WLAN) network at SMK Sirajul Falah Parung Bogor.
Analisis Faktor Penerimaan Penggunaan Aplikasi Identitas Kependudukan Digital (IKD) Ditjen Dukcapil Kemendagri Di Masyarakat Menggunakan Metode TPE (Technology, Personal, Environment) Darma Astuti, Rachmawati; Ramadhan, Fachry
Indonesian Journal Computer Science Vol. 3 No. 2 (2024): Oktober 2024
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/ijcs.v3i2.7167

Abstract

Penelitian ini menganalisis faktor-faktor yang mempengaruhi penerimaan penggunaan aplikasi Identitas Kependudukan Digital (IKD) yang dirilis oleh Ditjen Dukcapil Kemendagri di masyarakat. Penelitian ini berangkat dari pentingnya digitalisasi layanan kependudukan untuk meningkatkan efisiensi dan aksesibilitas bagi masyarakat. Namun, penerimaan teknologi baru sering kali dipengaruhi oleh berbagai faktor, sehingga diperlukan pemahaman mendalam mengenai hal tersebut. Penelitian ini menggunakan metode TPE (Technology, Personal, Environment) yang mengevaluasi pengaruh faktor teknologi, individu, dan lingkungan terhadap penerimaan aplikasi IKD. Tujuan dari penelitian ini adalah untuk mengidentifikasi dan menganalisis faktor-faktor yang mempengaruhi penerimaan masyarakat terhadap aplikasi ini. Hasil penelitian menunjukkan bahwa faktor seperti kemudahan penggunaan, manfaat yang dirasakan, dukungan sosial, dan kondisi lingkungan secara signifikan berperan dalam meningkatkan penerimaan aplikasi IKD. Penelitian ini diharapkan dapat memberikan kontribusi bagi pengembangan kebijakan dan strategi dalam implementasi layanan kependudukan digital yang lebih efektif dan efisien, serta meningkatkan kesadaran masyarakat akan pentingnya teknologi dalam kehidupan sehari-hari.
Indonesia Perancangan Jaringan Komputer untuk Sekolah Dasar Dengan Sistem Manajemen Bandwidth Hierarchical Token Bucket Simbolon, Jesika Marsaulina; Harafani, Hani; Astuti, Rachmawati Darma
Jurnal Bumigora Information Technology (BITe) Vol 3 No 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.966

Abstract

In the development of internet service technology, it has become a major requirement as a means of communication and exchanging information. Especially in the field of education such as elementary schols, internet facilities are very much needed where the users are administrative staff, teachers, students via the internet can access various knowledge needed quickly, so that it can simplify the learning process. Therefore, the bandwidth sharing system or it can be called bandwidth management must be in accordance with the conditions of the network service to be applied and bandwidth management is indispensable for multi-service networks, because the more and more varied applications that can be served by a network have an effect on link usage. In the network. The method in this research uses library research and the implementation uses the Hierarchical Token Bucket method, which is an application that function to regulate the distribution of bandwidth. The purpose of this analysis is to provide a bandwidth management system to make a fair distribution for users connected to the network. The results showed that the Hierarchicak Token Bucket method can regulate bandwidth usage for each client when downloading, uploading, streaming and browsing. Keyword: Bandwidth, HTB, Design, Network, Computer.