cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Jarkom
ISSN : -     EISSN : -     DOI : -
Core Subject : Education,
Arjuna Subject : -
Articles 9 Documents
Search results for , issue " Vol 2, No 1 (2014): EDISI DESEMBER 2014" : 9 Documents clear
PENGEMBANGAN SISTEM INFORMASI GEOGRAFIS UNTUK PEMETAAN DAN PENCARIAN LOKASI USAHA KERAJINAN TANGAN MENGGUNAKAN CAKEP HP Pratama, Meireza; Sholeh, Mohammad; Widyastuti, Naniek
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTHandicraft businesses is one of the businesses in Yogyakarta. The presence of GIS-based information system that would be very helpful to present information that is complete, and make the guide / tool to search for reaching these businesses to craft intended to integrate the map route or Jogja as a hint to go to the handicraft businesses.The system is built using web-based programming using CakePHP, with a MySQL database. Features map in this study using the Google Map API. Google map also has support for the manufacture of Yogyakarta which will be integrated with the location of handicrafts.The Geographic Information System has a feature to search information of handicrafts, handicraft businesses, location search, the route to the search of handicrafts using the instructions map, in this system there are also related products on the existing handicraft businesses. Using Geographic Information System handicraft businesses is expected to greatly assist visitors in finding a variety of handicrafts information in Yogyakarta. Keywords : GIS, Business Crafts, Routes, Google Map.
SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachmawati, Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Network security is a matter that needs to be given special attention, because infiltration often occurs with a variety of purposes. Intrusion detection systems (IDS) is a method of network security by detecting intrusion and provide output results in the form of alerts that can be known through the web. To implement the various components of the detection system is needed in order to maximize performance. In this study, the application is used as a detection system Snort attack. Basic Analysis and Security System (BASE) is used as a web interface. Log storage media attacks using MySQL. Fields marked with an ICMP protocol detection system ie, TCP and UDP. To follow up, use iptables and portsentry in the IP address blocking intruders. Attacks that occur can be analyzed using BASE, this application can indicate the type of attacks carried out and can see the span of attack for several months. By analyzing the types of attacks that occur, can help administrators reinforce the gap.Keywords : IDS, intruder, network security
IMPLEMENTASI LOAD BALANCING DUA LINE ISP MENGGUNAKAN MIKROTIK ROUTER OS [STUDI KASUS SISTEM JARINGAN LAN DI PT. WAHANA SEMESTA BANGKA (BABEL POS)] Arianto, Eris; Sholeh, Mohammad; Nurnawati, Erna Kumalasari
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTNeed for Internet access currently very high, either to find information, article and latest knowledge. Lots establishments have integrated the Internet into daily activities of environmental workplace.This it expected that the company can facilitate activities with ease. PT. Universe rides Bangka (Babylon Pos) is an establishments that stir of newspapers in the field of. On problem above, designed a network capable handling solid connection problems and slow, and used mikrotik for load balancing, load balancing with the solid lines will be balanced.Therefore arising solutions using two ISP and make the mikrotik load balancer. Mechanism that will mark the package mikrotik access internet, select a line which will be passed ISP and ISP equalize load. Based system development methods are used, namely Network Development Life Cycle (NDLC), before determine load balancing method, author conducted an analysis of network conditions be applicable in Babel Pos. Selection of PCC load balancing method because it meets criteria because it can increase speed the connection and share the burden on both the gateway to prevent overload. Then authors also Implementing techniques fail over, which is where if one gateway connection was lost, the other gateways will be automatically backups and sustains all network traffic. Keywords: Double internet connection, Load Balancing, Mikrotik
ANALISIS PERBANDINGAN KINERJA JARINGAN VPN BERBASIS MIKROTIK MENGGUNAKAN PROTOKOL PPTP DAN L2TP SEBAGAI MEDIA TRANSFER DATA Irnawan, Fahmi Dhimas; Triyono, Joko; k, Rr. Yuliana Rachmawati
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTVirtual Private Network (VPN) is a computer networking technology which developed by the companys large-scale with network that connects other networks over the Internet using the path that requires privacy in communication. In VPN networks, the Internet is a media that becomes support facilities in the communication process. This case because the Internet becomes an access point to data transfer between different client location or location from VPN server.In the process of testing using three mechanisms analysis captured from the calculation of data transfer, video on demand, and  reliability of access the  website. The process of data transfer in a VPN network using FTP with 5 parameter files of different sizes in each file. Then the delay calculation using video on demand files saved on a server with a VPN client localhost with audio and video type of files. The reliability of access to the website using ping and trace route media. Differences between client location becomes an advantages with using a VPN network that is very useful to share data or resources. VPN network is also able to provide an alternative access to a website that is on the internal VPN server. So the website behind VPN server and accessed by the VPN client more closer than without using VPN. Keywords : VPN, encapsulation, data transfer
IMPLEMENTASI INTRUSION DETECTION SYSTEM (IDS) PADA SERVER DEBIAN MENGGUNAKAN JEJARING SOSIAL SEBAGAI MEDIA NOTIFIKASI Budiman, Sahid Aris; Iswahyudi, Catur; Sholeh, Mohammad
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTIntrusion Detection System (IDS) is a software that can detect suspicious activity in a system or network . IDS can inspect inbound and outbound traffic in a system or network, analyzing and searching for evidence of trial intrusion. Implementation of IDS on the server using social networking (facebook, twitter, and whatsapp) as notification media makes it easy for administrators identifying infiltration attempt by parties who are not responsible. Social networking on a system is built to serves to provide notifications to administrators as soon as possible when an attack occurred on the server. A message sent contains the IP address of hosts are detected by the system. Client later attacks by IDS snort stored into a MySQL database , at the same time in automatic trigger will run iptables already defined and send notifications to social networks based on the type of attack that performed by the intruder. Based on the test, the system is capable to processing output data from Snort IDS and it can also recognize all activities conducted an intruder in attempt to infiltrate into the system by using the ping flood, syn attack, port scanner, the SSH and FTP based on rules has been applied. Then do the blocking of IP addresses that are considered as intruder after that the system will provide a report to the administrator through social media and web monitoring of the presence of an intruder who trying to get into the system.Keywords: IDS, snort, social networking
ANALISIS DAN PERANCANGAN VLAN PADA DISHUBKOMINFO KABUPATEN MANGGARAI MENGGUNAKAN CISCO PACKET TRACER Pantu, Yosefina; Iswahyudi, Catur; k, Rr. Yuliana Rachmawati
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT       Department of Transportation, Communication and Information of Manggarai Regency, is one of the instance of Regional Government of Manggarai, NTT, which is responsible to help the Head of Region concerning transportation, communication and information affairs. The lackness of human resources which was competent in computer networking, the high cost of VSAT IP Broadband internet service and maintenance cost of network’s backbone which is wireless based, have been becoming a problem to the Department concerning their main duties. As an impact, it is necessary to the Department to change their network’s backbone to wired network based, using VLAN. VLAN can divide network into several segments with low cost implementation. The using of VLAN Trunking Protocol (VTP) will ease the network administrator in managing VLAN.            The VLAN design in this study used hierarchical model. The logical layer for data distributing was divided into two layers, core/distribution and access layer. Routing between VLANs used “router-on-a-stick using trunk” model, so that the workstations which were owned by different VLAN can communicate each other by using one router only. By using simulation method for testing the design, it was discovered that all workstations between different VLAN have been successfully connected each other and all servers were well-functioned.   Key words : VLAN, VTP,  hierarchical, router-on-a-stick using trunk
IMPLEMENTASI KONSEP MULTI-NAS DENGAN MENGINTEGRASIKAN VPN SERVER DAN FREERADIUS SERVER DALAM MEMBANGUN SISTEM OTENTIKASI JARINGAN WIFI Hanafi, Muh. Ibnu Habil; Raharjo, Suwanto; ., Suraya
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT Some of WiFi networks is only provided the security with default security system, and some have not any security, and also the users management system for people who use the WiFi is not available. It can be occurred because a lack of oversight on development and maintenance the resources of WiFi network services. By analyzing the problems, it will be possible to get the best solution to generates a secure WiFi network services.Steps done in process of designing a network infrastructure on solution to generates a secure WiFi network services, Multi-NAS concept with FreeRADIUS server as authentication method and integration methods of VPN with FreeRADIUS server is can be used to support the purpose of designed network infrastructure. By implementing of those methods will be able to increase the security of WiFi network and user internet access. In the implementation process, data analysis is required to applying those methods in as an analysis infrastructure requirements by referring to the system that runs in infrastructure as basic knowledge of Linux, Mikrotik and Computer Networks.Thereby, implementation the method of authentication system on infrastructure will be provide a good security in the WiFi network and provide a secure users internet access of WiFi network.  Keywords: WiFi, Server, FreeRADIUS, Network.
APLIKASI MONITORING KEAMANAN JARINGAN DENGAN MENGGUNAKAN IDS DAN ROUTER MIKROTIK wiyanto, Pidie; Hamzah, Amir; Sholeh, Mohammad
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTComputer network security system is an important thing in today’s technological era. Security of data is vital point and need more extra control of it. Value of data within an institution or a particular company can be very valuable if the information contained in them can result in a gaining advantage of one or more parties. The system is capable to processing  output data from mikrotik, and it can also recognize all activities an intruder in attempt to infiltrate into the system by using  port scanner, the ssh, ftp,then do the bloking of ip address that are considered as intruder after that the system will provide a report to the administrator through webserver of the presence of an intruder who trying to get into the system. The system is capable to processing  output data from mikrotik, and it can also recognize all activities an intruder in attempt to infiltrate into the system by using  port scanner, the ssh, ftp,then do the bloking of ip address that are considered as intruder after that the system will provide a report to the administrator through webserver of the presence of an intruder who trying to get into the system.Keyboard :security system,Instrusion detection system, Mikrotik
PENGONTROLAN VPS (VIRTUAL PRIVATE SERVER) SEBAGAI SERVER RADIO STREAMING VIA ANDROID Hidayat, Rohmat; Sutanta, Edhy; Raharjo, Suwanto
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTRadio streaming is a technology for multimedia services are growing rapidly and become a trend at the moment is real-time multimedia, interactive and holding a very important role in todays society as a medium which is very actual for entertainment, information or business. Radio streaming service on computer networks generally involve a multipoint communication over the two sides simultaneously (server and client), which skipped on a TCP/IP network.On this research will be implemented a streaming server radio built on a VPS (virtual private server) namely a technology side about server operating systems and software that allows a machine with large capacity divided into several virtual machines. Every virtual machine serving the operating system and software independently and with new configuration that fast. With the technology advancement is very fast currently it is possible to develop a remote desktop application of a smartphone to a virtual machine.The trial was done in accordance with the principle of radio stream, where as the purpose of the research is how to develop the application as a streaming radio server control by leveraging advances in technology of mobile devices both smartphone or Android-based tablet PC anywhere so long as connected to the internet network. Give the admin a streaming radio the ease in doing his job without having to always carry a laptop or even a PC computer to do broadcasting a radio stream.Keywords: android, streaming radio, server, smartphone.

Page 1 of 1 | Total Record : 9