cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Jarkom
ISSN : -     EISSN : 23386312     DOI : -
Core Subject : Education,
Arjuna Subject : -
Articles 208 Documents
PENGEMBANGAN SISTEM INFORMASI GEOGRAFIS UNTUK PEMETAAN DAN PENCARIAN LOKASI USAHA KERAJINAN TANGAN MENGGUNAKAN CAKEP HP Pratama, Meireza; Sholeh, Mohammad; Widyastuti, Naniek
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTHandicraft businesses is one of the businesses in Yogyakarta. The presence of GIS-based information system that would be very helpful to present information that is complete, and make the guide / tool to search for reaching these businesses to craft intended to integrate the map route or Jogja as a hint to go to the handicraft businesses.The system is built using web-based programming using CakePHP, with a MySQL database. Features map in this study using the Google Map API. Google map also has support for the manufacture of Yogyakarta which will be integrated with the location of handicrafts.The Geographic Information System has a feature to search information of handicrafts, handicraft businesses, location search, the route to the search of handicrafts using the instructions map, in this system there are also related products on the existing handicraft businesses. Using Geographic Information System handicraft businesses is expected to greatly assist visitors in finding a variety of handicrafts information in Yogyakarta. Keywords : GIS, Business Crafts, Routes, Google Map.
SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachmawati, Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Network security is a matter that needs to be given special attention, because infiltration often occurs with a variety of purposes. Intrusion detection systems (IDS) is a method of network security by detecting intrusion and provide output results in the form of alerts that can be known through the web. To implement the various components of the detection system is needed in order to maximize performance. In this study, the application is used as a detection system Snort attack. Basic Analysis and Security System (BASE) is used as a web interface. Log storage media attacks using MySQL. Fields marked with an ICMP protocol detection system ie, TCP and UDP. To follow up, use iptables and portsentry in the IP address blocking intruders. Attacks that occur can be analyzed using BASE, this application can indicate the type of attacks carried out and can see the span of attack for several months. By analyzing the types of attacks that occur, can help administrators reinforce the gap.Keywords : IDS, intruder, network security
ANALISA PERBANDINGAN EASYHOTSPOT DAN MIKROTIK DALAM PENERAPAN HOTSPOT AREA DENGAN SISTEM AAA Lubis, Rizal Fakhruddin; Raharjo, Suwanto; Sutanta, Edhy
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTAt present more and more public places are provided hotspots area in order to attract consumers. Such facilities are generally only be used by a particular user is allowed, so needed a software to authenticate the prospective user prior to access to the Internet using hotspots area. Many alternative software options available, so that the necessary guidelines for choosing the right software to do security, one with the AAA system (Authentification, Authorized, Accounting). This study compared two software namely EasyHotspot and Mikrotik for the implementation of the AAA system in hotspot areas.Key words: EasyeHotspot, Mikrotik, hotspots, internet.
MEMAKSIMALKAN POTENSI BISNIS INTERNET PADA JARINGAN NIRKABEL (Studi Kasus: Pengembangan Jaringan Lan di Pondok Pesantren Terpadu Al Mumtaz) Setiadi, Yuki Syambudi; Raharjo, Suwanto; Triyono, Joko
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTWireless technology, has now spread all-over the nation. By using radio waves, wireless technology on computer network becomes indicate its existence compare to conventional network model (wired network). The existence of technology which becomes cheaper, has support the existence of these wireless network also. Nowadays, areas supported with wireless network or often called hotspot become easier to find. The cheaper the devices to build these hotspot networks, has passionate peoples to use this business opportunity on wireless network. Many tricks use by businessman, start with obligation to buy good before using hotspot facility until “Warung Internet” AKA “WARNET”. But, using prepaid cards AKA vouchers are the most prospective business strategy. This occurs because it simplicity to manage on businessman’s side and it simplicity on customer’s side. Consider to the target of PT. Telkom which obsessed to make Indonesia becomes nation with the largest numbers of WiFi area in Asia (Yandi, 2012), it is 10 millions WiFi radio at 2015, is certainly hotspot business is one of the “hottest” business in future. But thus, hotspot business must be controlled so it doesn’t cross-side with law and norm, moreover if this business runs within Islamic Boarding School’s environment. With some synchronization between the system and Islamic Boarding School’s ideology, then this hotspot business will becomes really useful for the instance.Keywords: Hotspot, Voucher, Ideology, Islamic Boarding School
ANALISIS DAN PERANCANGAN JARINGAN DUAL STACK SEBAGAI METODE TRANSISI IPv4 KE IPv6 Anita, Merlie; Raharjo, Suwanto; Sholeh, Mohammad
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTIPv6 present as IPv4 replacement with some feature to cover IPv4 weakness. Transition is needed in order to migrate to IPv6 because totally migration will cause much networking problem considering most of network device in this time are still designed for IPv4.Transition method used in this research is dual stack which connected to tunnel broker so that local network can communicate with internet and be able to access IPv6 sites. In dual stack network, host and router implements both IPv4 and IPv6. With these two kind of IP, gateway address must consists of two different addresses either because sending and receiving process from client to server or vice versa is happen in separate way. Dual stack most implemented in a network because its compatibility in network device and it doesn’t need necessary to change extremely configuration of IPv4 existing network.As a result from this research, IPv4 network performance has 2% faster for RTT than IPv6 network. For time used and speed transfer using FTP, IPv4 network has 3% faster than IPv6 network. IPv6 network has 10% better performance for throughput than IPv4 does. Whereas jitter, IPv6 has 44% smaller than IPv4. Considering IPv4 limited allocation address nowadays doing the transition to IPv6 using dual stack network is a good choice to deploy IPv6 used.Keywords: dual stack, IPv6, tunnel broker
IMPLEMENTASI RADIUS SERVER PADA JARINGAN VIRTUAL PRIVATE NETWORK Pramana, ivan Joi; Widyastuti, Naniek; Triyono, Joko
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTVPN network architecture is motivated by the needs of the existence of a network that specializes certain users to access personal data from a server. Virtual Private Network ( VPN ) is a network of local communication system over a public network . While RADIUS is a networking protocol that is used as the authentication and recording of user accounts connected VPN network , VPN Implementation Radius network is useful to establish a system of local network through a public network where the user account can be set and in monitoring by using web authentication . The data will pass through the VPN network traffic is encapsulated by the underlying network . In VPN networks , the Internet is a medium that is becoming mainstream in the communication process . That is because the Internet becomes an access point to transfer data between different client location or the location of the VPN server . VPN network on the test results it can be seen that the VPN data traffic can provide a solution to transfer data with a diversity of sizes and file types . The process of data transfer in a VPN network can use FTP , SFTP , SMB . Differences between the client location becomes a its own advantages in using a VPN network that is useful for exchanging data or resources.Keywords: VPN, RADIUS,network
ANALISIS PERBANDINGAN KINERJA JARINGAN VPN BERBASIS MIKROTIK MENGGUNAKAN PROTOKOL PPTP DAN L2TP SEBAGAI MEDIA TRANSFER DATA Triyono, Joko; Rachmawati, Rr.Yuliana; Irnawan, Fahmi Dhimas
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTVirtual Private Network (VPN) is a computer networking technology which developed by the companys large-scale with network that connects other networks over the Internet using the path that requires privacy in communication. In VPN networks, the Internet is a media that becomes support facilities in the communication process. This case because the Internet becomes an access point to data transfer between different client location or location from VPN server.In the process of testing using three mechanisms analysis captured from the calculation of data transfer, video on demand, and reliability of access the website. The process of data transfer in a VPN network using FTP with 5 parameter files of different sizes in each file. Then the delay calculation using video on demand files saved on a server with a VPN client localhost with audio and video type of files. The reliability of access to the website using ping and trace route media. Differences between client location becomes an advantages with using a VPN network that is very useful to share data or resources. VPN network is also able to provide an alternative access to a website that is on the internal VPN server. So the website behind VPN server and accessed by the VPN client more closer than without using VPN.Keywords : VPN, encapsulation, data transfer
IMPLEMENTASI LOAD BALANCING DUA LINE ISP MENGGUNAKAN MIKROTIK ROUTEROS [STUDI KASUS SISTEM JARINGAN LAN DI PT. WAHANA SEMESTA BANGKA (BABEL POS)] Arianto, Eris; Sholeh, Muhammad; Nurnawati, Erna Kumalasari
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTNeed for Internet access currently very high, either to find information, article and latest knowledge. Lots establishments have integrated the Internet into daily activities of environmental workplace.This it expected that the company can facilitate activities with ease. PT. Universe rides Bangka (Babylon Pos) is an establishments that stir of newspapers in the field of. On problem above, designed a network capable handling solid connection problems and slow, and used mikrotik for load balancing, load balancing with the solid lines will be balanced.Therefore arising solutions using two ISP and make the mikrotik load balancer. Mechanism that will mark the package mikrotik access internet, select a line which will be passed ISP and ISP equalize load. Based system development methods are used, namely Network Development Life Cycle (NDLC), before determine load balancing method, author conducted an analysis of network conditions be applicable in Babel Pos. Selection of PCC load balancing method because it meets criteria because it can increase speed the connection and share the burden on both the gateway to prevent overload. Then authors also Implementing techniques fail over, which is where if one gateway connection was lost, the other gateways will be automatically backups and sustains all network traffic. Keywords: Double internet connection, Load Balancing, Mikrotik
PERANCANGAN BLUE PRINT JARINGAN MENGGUNAKAN VIRTUAL LAN (VLAN) DENGAN STUDI KASUS (PT. PLN PERSERO AREA KUDUS) Puspito, Faesol; Widyastuti, Naniek; Triyono, Joko
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTThe development of computer network technology is growing rapidly as the current needs of people who use computer networks. It is seen from the number of companies or organizations that use computer networks. Thus the increasing needs and the increasing number of network users, the network also required the presence of forms that provide maximum results, both in terms of the efficiency of the network device, configuration and security. Based on these conditions, conducted an analysis of the existing network, which includes the structure, network topology, network devices. From the analysis it made the design blueprint of the new network by using VLAN. Prior to implementation, the first blueprint for a VLAN network is simulated using Packet Tracert. There are several advantages of a VLAN network, among others, can manage the switch manageable. In terms of flexibility, users on the same VLAN network is not dependent on the physical layout or location of the user is located. Moreover, in terms of availability. The use of VLANs also provide a higher level of security, since each user can not just go into the switch and dependent with other users.Keywords : VLAN, blue print, switch.
PERANCANGAN DAN PENGEMBANGAN JARINGAN VLAN PADA DILI INSTITUTE OF TECHNOLOGI (DIT) TIMOR LESTE MENGGUNAKAN PACKET TRACER Guterres, Lilia Ervina Jeronimo; Triyono, Joko; Kumalasari, Erna
Jurnal Jarkom Vol 1, No 2 (2014): EDISI JUNI 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTVirtual LAN (VLAN) is a network of networks that are connected together despite different locations to do with the configuration of the equipment switch trunking method, the switch can be connected to the network router to connect a specified VLAN. This research will design a virtual network environment LAN in Dili Institute Of Tecnhology (DIT) Timor Leste provide results that can improve perfroma VLAN network, the distribution network based on the existing department, enabling administrators to manage the network, minimizing costs, and security methods.In the trials conducted on two network design is to test connectivity, data transmission and download / upload, on each VLAN to know the results of the average and will be compared with two network design and good where it will be used.Keywords: VLAN, Trunking Switch, Router

Page 4 of 21 | Total Record : 208