36 research outputs found

    Total Cost of Ownership Formulation Analysis for Virtualization Data Center in University

    Get PDF
    Aspects of information technology has influenced the business processes of all types of organizations, including the educational institutions. Educational institutions have implemented a digital campus technology trends. At present many digital campus infrastructure technology brings cloud computing. With cloud computing as part of the IT strategy, an organization can increase their capacity to concentrate on running the business process without thinking of investing in large-scale IT as IT investment before the era of cloud computing.The implementation of cloud computing, based on virtualization technology. Previous research has established that the application of virtualization technology offers ease in data center management and reduce problems may arise when technology brings physical servers in the data center. This paper will discuss the application of virtualization technology in the data center an educational institution. It will calculate and discuss about total cost of ownership through application of virtualization technology on data cente

    MACHINE LEARNING UNTUK LOCALIZATION DALAM GEDUNG BERBASIS RSS FINGERPRINT MENGGUNAKAN IEEE 802.11g

    No full text
    cross validation This research discusses indoor localization using the IEEE 802.11g wireless network with machine learning approach. Measurement of RSS method is based on RSS-fingerprinting. Machine learning algorithms that are used for estimating location of the RSS are kNN and Naive Bayes. In this research, indoor localization is conducted in the entire room on the 3rd floor of Electrical Engineering and Information Technology (JTETI) Universitas Gadjah Mada (UGM) building. Area of the building is 1969,68 m 2 . Four different configurations are provided in the experiments. The best configuration would be used as indoor localization in all room of the 3rd floor. The first experiment is measurement of RSS fingerprint with 2 m 2 area of grid in 3rd floor corridor, the second experiment is measurement of RSS fingerprint with 1 m 2 area of grid (the first and second experiments use all of the permanent access point (AP) on the JTETI UGM building), the third experiment is measurement of RSS fingerprint with 1 m 2 area of grid. The third experiment only uses permanent AP on the third floor. The fourth experiment is measurement of RSS fingerprint with 1 m 2 area of grid. The experiment is used two AP on the 3rd floor and three additional AP, which has set randomly on the 3rd floor. Result of the experiments show that the best accuracy is obtained from the fourth experiment, which uses RSS fingerprint with two AP on the 3rd floor and three additional AP in 1 m 2 area dimension of grid. The accuracies that are obtained using in the learning phase are 89,46% using kNN with k = 1 and 43,74% using the Naive Bayes algorithm. Average errors of distance estimation are 4,13 meters using kNN algorithm and 6,20 meters using Naive Bayes algorithm in the online and post learning phase. From the experiments, average errors of distance estimation for indoor localization in all room of 3rd floor are 4,93 meters using kNN with k=1 and 6,29 meters using the Naive Bayes algorithm in the offline and learning phase. In the online and post learning phase, average errors of distance estimation average are obtained 5,25 meters using kNN algorithm and 7,82 meters using Naive Bayes algorithm

    ANALISIS POLA AKSES INTERNET DENGAN INTERVENSI EDUKASI DAN FILTERING BERDASARKAN LOG PROXY SQUID SERVER

    No full text
    Currently the Indonesian government tried to improve Information Technology resources. Implementation can be seen from the procurement of infrastructure, applications and Internet access. But efforts to measure and improve utilization of these things are still minimal. This research attempts to analyze the patterns of Internet access by intervention in the form of virtual education using educational video and proxy filtering, then look at the pattern of access changes that occur through the Squid proxy log analysis. The results showed an increase in access to positive and negative content decreased access. The results of this research seeks to provide strategic advice on the use of Internet access, particularly to local government to use the Internet can be more optimal

    ANALISIS PERFORMA CENTRAL AUTHENTICATION SERVICE (CAS) PADA JARINGAN SINGLE SIGN ON (SSO): Studi Kasus pada PSDI UGM

    No full text
    The Web application development indirectly demanding user applications to manage user accounts and passwords application system as well, so as not to be abused by parties not authorized. So many user account security methods have been tried to solve the problem. Including by implementing Authentication Service on Single Sign On (SSO) network by building a CAS Server as authentication center and with a variety of programming languages. This research was conducted in the offices of PSDI UGM by analyzing the CAS Server (existing) built with JSP (Java Server Page), and CAS Server (replica) that was built with the PHP programming language. Aside from that, this thesis also discusses how to test the level of security and performance of the CAS Server (existing as well as replica) using hacking application. Whereas the methods used in this testing is white box and black box. The results showed that the CAS Server (existing as well as replica) can not be penetrated by hacking applications used above, if the CAS Server on both the security protocol using SSL. However, the security protocol SSL is used on the CAS Server (existing) still doubted the security level until there is clarification directly from the Office of PSDI UGM. While the level of performance (response time and load test) maximum on the CAS Server (existing)=4.480.000 user with total time request=3.839,421 ms. While on the CAS Server (replica)= 4.490.000 user with total time request=5.406,568 ms. Keywords - Single Sign On (SSO), Authentication, CAS Server, PHP, Hacking

    MODEL IMPLEMENTASI CENTRALIZED AUTHENTICATION SERVICE PADA SISTEM SOFTWARE AS A SERVICE

    No full text
    Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. Trust and security have prevented businesses from fully accepting cloud platforms. Cloud computing as a computing solutions continues to expand even as the backbone of the Organization, in particular Cloud system-built Faculty of Engineering Muhammadiyah University of Magelang. On the other hand the growth of the number of users on the service Cloud-based school information system give rise to other problems. The security and availability of the server machine to be a problem in the development of Cloud Computing Services. The difference model of authentication on any application such as school information systems and server machine threats to cloud service providers. Diversity model of authentication on each application and the server machine is placed on the same cloud system will complicate cloud manager in identifying attacks against cloud applications are built. To resolve these problems then needed a model for authentication in the cloud service using single sign-on Protocol. By doing some testing of the implementation model, then the resulting performance measures for each installation that will be realized. Results of the measurement authentication model used to determine formula the authentication type that will be realized in the Faculty of Engineering Muhammadiyah University of Magelang

    ANALISIS QUALITY OF SERVICE DARI LAYANAN INTERNET PROTOCOL TELEVISION (IPTV)

    No full text
    IPTV is convergency product between broadcasting, telecommunication and information technology because given multimedia service which in the form of TV broadcasting, video, audio, text, graphic, and data that transmitted to the customer passing broadband using IP protocol (Internet Protocol). Service that given by IPTV has better quality than convensional TV, such as voice over internet protocol (VoIP), data (internet), and video on demand (VoD). Million people in the world were using IPTV so that this technology has growth more raised and always increase every years. IPTV is supporting by there is quality (QoS/QoE), security, realibility and possible communication two ways or interactivitelly �real time�. So that, Quality of Service (QoS) from IPTV service became main attention that can be save. This research has purpose to analyze QoS (delay, jitter, MOS and throughput) from IPTV service such as VoIP, internet (HTTP, FTP), and IPTV in the simulation. The QoS result from simulation will be compare with standard ITUT (delay, jitter). This research is implementation IPTV service in the OPNET simulator using four scenario, that is: account bandwidth needed from masing service, calculate and compare the QoS value, testing and implementation queue method, and choose the effective queue method. The result of this research is showing bandwidth requirement for downlink and uplink from the services are VoIP 50 kbps (downlink) and 50 kbps, the internet are 54 kbps (downlink) and 54 kbps (uplink), and the IPTV service6538 kbps / 6.5 Mbps (downlink) and 14 kbps (uplink). The QoS result showing that using bandwidth � 15 Mbps, resulting jitter value and delay that can tolera�t e 25o0r ms, the MOS increasing became 200% and throughput 600%. The QoS that resulting from queue method applying on the node SDLAM with bandwidth 8 Mbps, only can decrease the value of delay and jitter 50% - 65% on the VoIP and internet services. Beside that, PQ method became one of the queue method that can be optimalizing of QoS eventhough only decrease the jitter 10%

    PENGEMBANGAN PURWARUPA SISTEM PEMANTAU BANJIR LAHAR DINGIN MEMANFAATKAN PENGUKURAN INTENSITAS GETARAN DAN KEDALAMAN ALIRAN BERBASIS JARINGAN SENSOR NIRKABEL IQRF

    No full text
    s Volcanic mudflows or lahars commonly occur following volcanic eruptions. Lahar can cause catastrophic destruction in their paths because of their energy and speed. Huge volume of lahars can bury dwelt areas. Lahars have consistency, viscosity and approximate density of wet concrete, thus they make higher vibration intensity on the riverbanks when flowing down compared to what water does at the same depth and channel. These different vibration intensities when combined with the depths of flow can become a useful indication of lahar events. Additional front-end sensors were built in this stud

    ANALISIS DAN EVALUASI USER ACCEPTANCE DENGAN PENDEKATAN TECHNOLOGY ACCEPTANCE MODEL (TAM) PADA E-PROCUREMENT DI KABUPATEN KEBUMEN

    No full text
    Implementation of e-procurement in the mechanism of procurement on Kebumen government regency makes a change from a manual system with a pattern into the form of face to face towards electronic services. The policy raises the attitude and behavior of users to accept the application and use it for real. This study aims to obtain empirical evidence about the effect of acceptance aspects of convenience (ease of use) and utility (usefulness) understanding of computers and the Internet on e-procurement in Kebumen handle links by using a model approach to technology acceptance model (TAM). Analysis stuctured equation modeling (SEM) was used to determine the relationship between exogenous variables to endogenous variables with the help of AMOS software. Evaluation of analysis results are used as ingredients making technical recommendations, practical as well as regulations on e-procurement, so that the goals and objectives of the implementation of these policies can be achieved

    PERANCANGAN SISTEM PEMANTAUAN KONEKSI JARINGAN SERAT OPTIK BERBASIS WEB UNTUK DIVISI TELKOM SOLO

    No full text
    Fiber opticis is one of transmission media that is able to transmit data with a large capacity with high reliability. The reliability of optical fiber obtained by using optical waves (laser light) as a carrier wave. Distribution of information on fiber optics carries by the digital signal propagated in the form of light waves. Light waves can carry more information (large capacity) with high speed. The data transfer rate that can be able to do through the optical fiber can be reached 200,000 Mbps, a fantastic value. Base Station Control (BSC) is a telecommunications device that functions to handle fiber-optic network. BSC is connected by Line Priter Terminal (LPT) 1 cable to Nartscan. Interference breakdown which occure in the fiber optic network appeared on BSC as an alert and it�s recorded in the Nartscan�s log. The breakdown in the fiber optic network greatly affects the communication process that requires banwidth at high speed. Fiber optic network dropped caused by wild excavation, fallen trees, and cable theft. Nartscan and BSC located in Solo Network division offices and the fiber optic network spread accross the regional areas, so if there is a fiber optic network dropped in the center detected, then the officers in those regional areas can not directly determine the location of the drop. Conditions that exist at the moment are to manually notifications when there are alerts on BSC that the error has been recorded in Nartscan offline. BSC and Nartscan only be monitored from the center, then the alert notification is done manually by phone or sms by the officer on duty. It is considered less than the maximum because of the down time to the management process takes a long time. A fairly long process causes losses to the company due to the fiber optic network is the primary network backbone or can not communicate. Seeing the problems faced by Telkom Network Solo Division, it needed a system that could do the monitoring and prevention of these disorders online and realtime. The results of this web-based application design is able to sort out the BSC�s log data stored in Nartscan that contains data relating interference fiber optic networks. Web-based application will process the data in the Nartscan�s directory and can be accessed online and real time data reloading every five seconds so that resulting notification alerts that are connected to the intranet network Telkom. Web-based applications capable to generating new database that has the data input fiture such as, when processing time is complete, problems and solutions in the field in order to repair the fiber-optic network

    ANALISIS UNJUK KERJA ROUTING PROTOCOL OLSR PADA WIRELESS MESH NETWORK BERBASIS STANDAR IEEE 802.11b/g

    No full text
    Wireless Mesh Network (WMN) is a communication network model that incorporates wireless technology and ad-hoc routing in a mesh topology. Optimized Link State Routing Protocol (OLSR) is one of the routing protocols in ad-hoc network that makes every wireless routers connected, communicated and produced a wide range of network. This research analyses the performance of a WMN testbed using the OLSR routing protocol. To determine the performance of the WMN, throughput, latency, jitter, and packet loss was measured on WMN tesbed. The testbed was built using five wireless router Linksys WRT54GL with OpenWRT Freifunk firmware on the first floor of the Central Administrative Office Building, Faculty of Engineering, Gadjah Mada University, Yogyakarta. Result of the analysis in WMN testbed are as follow
    corecore