cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Jarkom
ISSN : -     EISSN : 23386312     DOI : -
Core Subject : Education,
Arjuna Subject : -
Articles 208 Documents
MEMBANGUN SISTEM MANAJEMEN PERGUDANGAN MENGGUNAKAN ARSITEKTUR THREE-TIER ., Anggreawan; Hamzah, Amir; Iswahyudi, Catur
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT               Three-tier architecture is an innovation of client server architecture. In the three-tier architecture, there are services presentation or user interface logic is placed on the client machine. Issued on the business logic and the client code is placed in the middle level. Data services layer contains the database server. Each level in the three-tier models are on a separate computer. Three-tier model concept is a concept that divides functionality into layers, applications gain scalability, and security. Currently the system at PT. Ungaran Sari Garment has been computerized in handling the transaction flow of goods in and out. However, the application still has the disadvantage that the application can only be used by a single computer (stand alone) and standard office without any database and system well. With the advantages of three-tier architecture, then build warehouse management system using three-tier architecture to assist in arranging entry and exit of goods to the warehouse, making the system more efficient in terms of use. Results from this study is the implementation of the warehousing system with three-tier architecture using SQLyog as its database can be used to input data entry and exit of goods to the warehouse, checking periodically warehousing reports in accordance with the functionality of each admin. By using a three-tier architecture as not to burden-sharing functionality on the server side and the client, because can use any computer that has been given permission by the server and are interconnected by a network. On the client side is only installation any web browser Keywords : Warehouse management system, Website, Client server, Three-tier.
PERANCANGAN DAN IMPLEMENTASI LOAD BALANCING REVERSE PROXY MENGGUNAKAN HAPROXY PADA APLIKASI WEB Noviyanto, Ari Budi; Kumalasari, Erna; Hamzah, Amir
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

AbstractServers are computers for computer center managers and the other. Many more client could make server have a hard woking. this situation will make the web serverperformance has decrease and making the access to the server will be difficulty because  the server was busy or time-out. another problem is a down server or server failure. that is the problem that we must be avaoided. To overcome these problems, merging severalserversinto a single unitthat can worksimultaneouslyforload balancingserveris the solution. One method that is meaningful is using load balancing or even distribution of a burden ( request ) on the web server aims to relieve a burden is borne each server. In the process load balancing any one kind of load balancer is HAProxy, HAProxy is a software load balancer to the application of tcp and http who support a need a counterweight burden.Haproxy have the ability to control traffic of each request data from clients and showing statistics from on use each web server that it can controlling. Design and implementation of haproxy as balancer reverse a proxy be able to address the problems caused by burden excessive traffic because haproxy divide the expense request that goes into server haproxy so that the use of haproxy as load balancer can overcome the problems because the distribution of the burden known to second server backend. Keyword: Network, Load Balancing, HAProxy
TEKNOLOGI 4G PADA JARINGAN GSM UNTUK KEBUTUHAN MOBILE INTERNET DI KOTA YOGYAKARTA Santoso, Bambang Wahyu; Iswahyudi, Catur; Triyono, Joko
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

AbstractThe rise of 4G LTE networks with all the benefits can promise super-fast mobile data communications. Currently  in Yogyakarta has been present 4G LTE technology that can be enjoyed by a few people, it is certainly affected by 4G device such a sim card 4G different sim cards 3G, data packets are used, a mobile device that supports 4G technology, as well as the area of coverage signal 4G uneven, to the area of signal coverage 4G in Yogyakarta city can be seen on the website of the network operator Indosat, and XL with coverage in the form of network points, but what about the location of base stations 4G on each network operator gsm, as well as the results of field testing on 4G signal quality in Yogyakarta.  Surely this is a question of its own for some parties, who want speed internet at a faster devices using 4G signal.To answer these questions do research on signal quality 4G in Yogyakarta. With this research is expected that people who want to enjoy the services of 4G technology can determine the location of the nearest 4G base stations, the maximum distance 4G signal, optimal distance to be able to enjoy 4G services. and people can also knew the distribution pattern 4G signal in Yogyakarta city. Keywords: 4G, GSM, 4G base stations, Mobile Internet, Yogyakarta.
PERANCANGAN SISTEM MONITORING PADA JARINGAN LOAD BALANCING MENGGUNAKAN MUNIN MONITORING Raka Siwi, Robertus Desta; Raharjo, Suwanto; Hamzah, Amir
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTThe increasing number of users who have connected to each other sometimes makes a lot of obstacles on the server, such as an increase in the performance of the server process that makes the server down and a lot of running processes. To overcome these problems, merging several servers into a single unit that can work simultaneously for load balancing server is the solution. One method is to use a proper load balancing or load balancing (request) to a web server aims to ease the burden on each server. In addition to cope with the load balancing methods, to keep the server in order to remain stable, the required monitoring network load balancing. In this issue, the monitoring process can be overcome with the addition of Munin to monitor the state of the server. With the addition of munin on the network load balancing, the activity on the server is going down in the event of a server, it can be directly terdeteksi.Munin produce produce a nice graph virtually every aspect of the server (load average, memory usage, CPU usage, traffic eth0 , etc.). Munin provide some information in graphs through a web interface. Keyword : Network, Load Balancing, Monitoring, Munin
IMPLEMENTASI VOIP MENGGUNAKAN ZRTP, G.729A, DAN FREESWITCH Budianto, Eko; Rachmawati K, Rr.Yuliana; Andayati, Dina
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTNowadays, the existence of VoIP communication is growing fast. However, communication that is common at this time has not fulfilled the needs of specific users. For particular users, the safety and fluency of the communication is the fundamental needs. This is about VoIP communication that combined between FreeSWITCH as SIP Server, ZRTP as an encryption method to securing communication, and the use of G.729A as an audio codec. To collect the data, it will use the wireshark application for observing Quality of Service during the communication such as delay, jitter, and packet loss. While cain& able application is used for sniffing the process of communication on the network. Using a process of testing using sniffing method, communication on the network which is not using encryption can be caught and read by both wireshark and cain& able application, while communication on the network which is using encryption can not be read by both application. The result of VoIP communication using ZRTP protocol as an encryption method is can not be read and decoded by wireshark and cain& able and the use of codec G.729A is more suiteable for VoIP communication. Keywords: VoIP, FreeSWITCH, G.729A, ZRTP, Encryption
BANDWIDTH MANAGER MENGGUNAKAN HIERARCHICAL TOKEN BUCKET PADA IMPLEMENTASI VIDEO STREAMING Soba, Saryadi K T; Rachamawati, Rr.Yuliana; Raharjo, Suwanto
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTScience and technology are increasingly evolving, has brought a wide range of new breakthrough, one that is increasingly technologically sophisticated and modern. This also participate in the field of computerization, computers that previously had limited functions only as a mere data processing, but now is able to play a major role in peoples lives everyday.Streaming video service is now urgently needed. It is characterized by many organizations or institutions that use streaming video access in bulk. The use of video streaming en masse this  network performasi downs along with the increasing number of users. One way to reduce the decline in performance is to set the bandwidth.Hierarchical Token Bucket (HTB) as implementer management of bandwidth available for free and can be run on Linux Operating system platform is a viable Bandwidth Manager analyzed their advantages and disadvantages, is expected to use proper and accurate will create a network that implements Bandwidth Manager is working optimallyKeywords: HTB, limit, bandwidth.
ANALISIS DAN PERANCANGAN VLAN PADA DISHUBKOMINFO KABUPATEN MANGGARAI MENGGUNAKAN CISCO PACKET TRACER Pantu, Yosefina; Iswahyudi, Catur; Rachmawati, Rr. Yuliana
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT       Department of Transportation, Communication and Information of Manggarai Regency, is one of the instance of Regional Government of Manggarai, NTT, which is responsible to help the Head of Region concerning transportation, communication and information affairs. The lackness of human resources which was competent in computer networking, the high cost of VSAT IP Broadband internet service and maintenance cost of network’s backbone which is wireless based, have been becoming a problem to the Department concerning their main duties. As an impact, it is necessary to the Department to change their network’s backbone to wired network based, using VLAN. VLAN can divide network into several segments with low cost implementation. The using of VLAN Trunking Protocol (VTP) will ease the network administrator in managing VLAN.            The VLAN design in this study used hierarchical model. The logical layer for data distributing was divided into two layers, core/distribution and access layer. Routing between VLANs used “router-on-a-stick using trunk” model, so that the workstations which were owned by different VLAN can communicate each other by using one router only. By using simulation method for testing the design, it was discovered that all workstations between different VLAN have been successfully connected each other and all servers were well-functioned.   Key words : VLAN, VTP,  hierarchical, router-on-a-stick using trunk
PENERAPAN QR CODE SEBAGAI KEAMANAN DATA DAN PENGGUNAANNYA UNTUK MEDIA SALING TUKAR DATA ANTAR PARTNER Satria, Indra; Andayati, Dina; Rachmawati, Rr. Yuliana
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTAlongwith the rapiddevelopment of information technology, especially with regard tocomputersandthe Internet, data security is acomplex issue, one of whic his the manipulation of data. One way to prevent this is to create data security system that can prevent data manipulation activities and ensure that the data is authentic. In this case, data security technology using the QR code is afairly precise effort. Application of the method QR code on asecret message is one of the solutions in the application of data security systems. This application s built using the QR code with the function of AE Sencryption algorithm that will generatea digital image file is a three-dimensional shape ofthe barcode, then th egiven key as the AES decryption key toopen the message in the QRcode. The results of this application is a data security system that displays the message, as data security efforts. With the application of QR codeis expected to help reduce the activity of data manipulation. Keywords : QR code, encryption function, AES, authentic.
APLIKASI MONITORING KEAMANAN JARINGAN DENGAN MENGGUNAKAN IDS DAN ROUTER MIKROTIK Widianto, Pidie; Hamzah, Amir; Sholeh, Muhammad
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTThis study is aimed at making security application of computer network by using snort detection system method and mikrotik. Combining IDS method and IPTables mikrotik is to avoid intruder furthrmore, using web to make admin easily to monitor .This application aims to make system of network computer security easier, based on web and to be analyzed as well as controlled by administrator . this application is made to block ip address that is suspected bringing. The system is capable to processing  output data from mikrotik, and it can also recognize all activities an intruder in attempt to infiltrate into the system by using  port scanner, the ssh, ftp,then do the bloking of ip address that are considered as intruder after that the system will provide a report to the administrator through webserver of the presence of an intruder who trying to get into the system. Keyboard :security system, intruder,Instrusion detection system, Mikrotik
IMPLEMENTASI KONSEP MULTI-NAS DENGAN MENGINTEGRASIKAN VPN SERVER DAN FREERADIUS SERVER DALAM MEMBANGUN SISTEM OTENTIKASI JARINGAN WIFI Hanafi, Muh. Ibnu Habil; Raharjo, Suwanto; ., Suraya
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTSome of WiFi networks is only provided the security with default security system, and some have not any security, and also the users management system for people who use the WiFi is not available. It can be occurred because a lack of oversight on development and maintenance the resources of WiFi network services. By analyzing the problems, it will be possible to get the best solution to generates a secure WiFi network services. Steps done in process of designing a network infrastructure on solution to generates a secure WiFi network services, Multi-NAS concept with FreeRADIUS server as authentication method and integration methods of VPN with FreeRADIUS server is can be used to support the purpose of designed network infrastructure. By implementing of those methods will be able to increase the security of WiFi network and user internet access. In the implementation process, data analysis is required to applying those methods in as an analysis infrastructure requirements by referring to the system that runs in infrastructure as basic knowledge of Linux, Mikrotik and Computer Networks. Thereby, implementation the method of authentication system on infrastructure will be provide a good security in the WiFi network and provide a secure users internet access of WiFi network.  Keywords: WiFi, Server, FreeRADIUS, Network.

Page 6 of 21 | Total Record : 208