cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Jarkom
ISSN : -     EISSN : 23386312     DOI : -
Core Subject : Education,
Arjuna Subject : -
Articles 208 Documents
OPTIMALISASI RANCANGAN JARINGAN KOMPUTER MENGGUNAKAN GOOGLE SKETCHUP Taufik Ardiantoro; Joko Triyono; Erfanti Fatkhiyah
Jurnal Jarkom Vol. 4 No. 2 (2016): Desember 2016
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

All the time, mapping of computer networks in a building is a visualization in the form of 2-dimensional. To increase the quality of mapping network computer then can be made in the form of visualization mapping that resembles to the real life. It use the form of 3-dimensional (3D).The scope of the problem in this research there are a few limitation such as data collection and the creation of 3D computer network on campus 3 IST AKPRIND Yogyakarta. Objects that are examined include lecture rooms, laboratories, faculty room, and another room in campus 3 of IST AKPRIND Yogyakarta. The process of creating 3D computer network uses software google sketchUp. The data used in the form of survey results of observations of some parts of the building and photographs of every room. Network mapping results in the form of 3D is an interesting media, easily understood by users, can be used as a reference for the maintenance and development of the network, it can even be used as a means of introduction to campus building 3 description thoroughly. 3D image of computer networks and the building of the campus 3 IST AKPRIND produces up to date information about the physical building at this time.
PENERAPAN QR CODE SEBAGAI KEAMANAN DATA DAN PENGGUNAANNYA UNTUK MEDIA SALING TUKAR DATA ANTAR PARTNER Indra Satria; Dina Andayati; Rr. Yuliana Rachmawati
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Alongwith the rapiddevelopment of information technology, especially with regard tocomputersandthe Internet, data security is acomplex issue, one of whic his the manipulation of data. One way to prevent this is to create data security system that can prevent data manipulation activities and ensure that the data is authentic. In this case, data security technology using the QR code is afairly precise effort. Application of the method QR code on asecret message is one of the solutions in the application of data security systems. This application s built using the QR code with the function of AE Sencryption algorithm that will generatea digital image file is a three-dimensional shape ofthe barcode, then th egiven key as the AES decryption key toopen the message in the QRcode. The results of this application is a data security system that displays the message, as data security efforts. With the application of QR codeis expected to help reduce the activity of data manipulation.
APLIKASI MONITORING KEAMANAN JARINGAN DENGAN MENGGUNAKAN IDS DAN ROUTER MIKROTIK Pidie Wiyanto; Amir Hamzah; Mohammad Sholeh
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study is aimed at making security application of computer network by using snort detection system method and mikrotik. Combining IDS method and IPTables mikrotik is to avoid intruder furthrmore, using web to make admin easily to monitor .This application aims to make system of network computer security easier, based on web and to be analyzed as well as controlled by administrator . this application is made to block ip address that is suspected bringing. The system is capable to processing output data from mikrotik, and it can also recognize all activities an intruder in attempt to infiltrate into the system by using port scanner, the ssh, ftp,then do the bloking of ip address that are considered as intruder after that the system will provide a report to the administrator through webserver of the presence of an intruder who trying to get into the system.
IMPLEMENTASI KONSEP MULTI-NAS DENGAN MENGINTEGRASIKAN VPN SERVER DAN FREERADIUS SERVER DALAM MEMBANGUN SISTEM OTENTIKASI JARINGAN WIFI Muh. Ibnu Habil Hanafi; Suwanto Raharjo; Suraya -
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some of WiFi networks is only provided the security with default security system, and some have not any security, and also the users management system for people who use the WiFi is not available. It can be occurred because a lack of oversight on development and maintenance the resources of WiFi network services. By analyzing the problems, it will be possible to get the best solution to generates a secure WiFi network services. Steps done in process of designing a network infrastructure on solution to generates a secure WiFi network services, Multi-NAS concept with FreeRADIUS server as authentication method and integration methods of VPN with FreeRADIUS server is can be used to support the purpose of designed network infrastructure. By implementing of those methods will be able to increase the security of WiFi network and user internet access. In the implementation process, data analysis is required to applying those methods in as an analysis infrastructure requirements by referring to the system that runs in infrastructure as basic knowledge of Linux, Mikrotik and Computer Networks. Thereby, implementation the method of authentication system on infrastructure will be provide a good security in the WiFi network and provide a secure users internet access of WiFi network.
ANALISIS KUALITAS FINAL PROYEK WEBSITE MILIK BANK BOYOLALI TERHADAP PENGGUNA AKHIR(METODE WEBQUAL 4.0) Sony Cahyo Wibisono; Amir Hamzah; Uning Lestari
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

website development focuses only on the system, interface and content of the website content without any satisfaction research on the website is presented, this study aims to determine the level of satisfaction of the end user as well as an evaluation before the website was published on the main domain, research methods used WebQual 4.0 and scale linkert as the study interval. WebQual is one method or technique of measuring the quality of a website based on the perception of the end user. 4.0 WebQual method is based on three dimensions of usability, information quality dimensions and dimensional quality of the interaction. In the process of analysis used tranches respondent sample of 100 people consisting of 82 respondents which includes customers and employees as well as the 18 respondents not clients, data collection is divided into 50 respondents using an online questionnaire and 50 respondents using offline questionnaires. The next stage is the analysis of data consisting of validity, reliability and assessment with linkert scale. On the validity of the test using the formula Pearson Bevariate while test reliability using Cronbach's alpha formula. In the assessment using linkert scale with 5 scale interval. Based on the results of the research, the average total value sufficient satisfaction for publicizing the website with some items of the dimensions of quality of interaction that must be repaired.
BANDWIDTH MANAGER MENGGUNAKAN HIERARCHICAL TOKEN BUCKET PADA IMPLEMENTASI VIDEO STREAMING Saryadi K T Soba; Yuliana Rachmawati; Suwanto Raharjo
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Science and technology are increasingly evolving, has brought a wide range of new breakthrough, one that is increasingly technologically sophisticated and modern. This also participate in the field of computerization, computers that previously had limited functions only as a mere data processing, but now is able to play a major role in people's lives everyday. Streaming video service is now urgently needed. It is characterized by many organizations or institutions that use streaming video access in bulk. The use of video streaming en masse this network performasi downs along with the increasing number of users. One way to reduce the decline in performance is to set the bandwidth. Hierarchical Token Bucket (HTB) as implementer management of bandwidth available for free and can be run on Linux Operating system platform is a viable Bandwidth Manager analyzed their advantages and disadvantages, is expected to use proper and accurate will create a network that implements Bandwidth Manager is working optimally
ANALISIS DAN PERANCANGAN VLAN PADA DISHUBKOMINFO KABUPATEN MANGGARAI MENGGUNAKAN CISCO PACKET TRACER Yosefina Pantu; Catur Iswahyudi; Rr Yuliana Rachmawati K
Jurnal Jarkom Vol. 3 No. 1 (2015): Juni 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Department of Transportation, Communication and Information of Manggarai Regency, is one of the instance of Regional Government of Manggarai, NTT, which is responsible to help the Head of Region concerning transportation, communication and information affairs. The lackness of human resources which was competent in computer networking, the high cost of VSAT IP Broadband internet service and maintenance cost of network’s backbone which is wireless based, have been becoming a problem to the Department concerning their main duties. As an impact, it is necessary to the Department to change their network’s backbone to wired network based, using VLAN. VLAN can divide network into several segments with low cost implementation. The using of VLAN Trunking Protocol (VTP) will ease the network administrator in managing VLAN. The VLAN design in this study used hierarchical model. The logical layer for data distributing was divided into two layers, core/distribution and access layer. Routing between VLANs used “router-on-a-stick using trunk” model, so that the workstations which were owned by different VLAN can communicate each other by using one router only. By using simulation method for testing the design, it was discovered that all workstations between different VLAN have been successfully connected each other and all servers were well-functioned.
PERANCANGAN APLIKASI AUTOMATIC RESERVATION PADA UNIT PELAYANAN JASA BERBASIS MULTI CLIENT DENGAN SERVER STORAGE (Studi Kasus Unit Pelayanan Jasa Konveksi Toko Gorden Jogjakarta) Andrianto -; Erfanti Fatkhiyah; Suraya -
Jurnal Jarkom Vol. 3 No. 2 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Curtains vintage is one of the service providers tailor shop as well as sellers of goods curtains, Along with the order to make them quite overwhelmed in terms of bookkeeping. During this time they do the bookkeeping manually, only occasionally copied into the data-processing applications such as Microsoft Excel, which still must be input manually. Under these conditions, it will be created a booking system automatically and computerized, with the system expected to reduce the negligence of the officers, or the ambiguity of data. The system to be used is the customer data collection system, the cost calculation system, the date calculation system, as well as the entire financial report obtained from the service unit. The system uses the Delphi programming platform based on client server, so that each part will be getting its own computer to be able to access the menus on the UPJ. With the system described above, is expected to help employees to recapitalize the transaction and providing the speed and efficiency performance, while providing good service to customers
MEMBANGUN SISTEM MANAJEMEN PERGUDANGAN MENGGUNAKAN ARSITEKTUR THREE-TIER Anggreawan -; Amir Hamzah; Catur Iswahyudi
Jurnal Jarkom Vol. 3 No. 2 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Three-tier architecture is an innovation of client server architecture. In the three-tier architecture, there are services presentation or user interface logic is placed on the client machine. Issued on the business logic and the client code is placed in the middle level. Data services layer contains the database server. Each level in the three-tier models are on a separate computer. Three-tier model concept is a concept that divides functionality into layers, applications gain scalability, and security. Currently the system at PT. Ungaran Sari Garment has been computerized in handling the transaction flow of goods in and out. However, the application still has the disadvantage that the application can only be used by a single computer (stand alone) and standard office without any database and system well. With the advantages of three-tier architecture, then build warehouse management system using three-tier architecture to assist in arranging entry and exit of goods to the warehouse, making the system more efficient in terms of use. Results from this study is the implementation of the warehousing system with three-tier architecture using SQLyog as its database can be used to input data entry and exit of goods to the warehouse, checking periodically warehousing reports in accordance with the functionality of each admin. By using a three-tier architecture as not to burden-sharing functionality on the server side and the client, because can use any computer that has been given permission by the server and are interconnected by a network. On the client side is only installation any web browser
PERANCANGAN DAN IMPLEMENTASI LOAD BALANCING REVERSE PROXY MENGGUNAKAN HAPROXY PADA APLIKASI WEB Ari Budi Noviyanto; Erna Kumalasari N; Amir Hamzah
Jurnal Jarkom Vol. 3 No. 2 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Servers are computers for computer center managers and the other. Many more client could make server have a hard woking. this situation will make the web serverperformance has decrease and making the access to the server will be difficulty because the server was busy or time-out. another problem is a down server or server failure. that is the problem that we must be avaoided. To overcome these problems, merging severalserversinto a single unitthat can worksimultaneouslyforload balancingserveris the solution. One method that is meaningful is using load balancing or even distribution of a burden ( request ) on the web server aims to relieve a burden is borne each server. In the process load balancing any one kind of load balancer is HAProxy, HAProxy is a software load balancer to the application of tcp and http who support a need a counterweight burden.Haproxy have the ability to control traffic of each request data from clients and showing statistics from on use each web server that it can controlling. Design and implementation of haproxy as balancer reverse a proxy be able to address the problems caused by burden excessive traffic because haproxy divide the expense request that goes into server haproxy so that the use of haproxy as load balancer can overcome the problems because the distribution of the burden known to second server backend.

Page 8 of 21 | Total Record : 208