36 research outputs found
SERVICE AVAILABILITY DAN PERFORMA SUMBER DAYA PROSESSOR PADA INFRASTRUKTUR SERVER VIRTUAL
ABSTRACT
Server that have high processor capacity and virtualization technology capabilities are generally not fully utilized optimally as they are only used to provide one application service. Virtualization is a technology that has the ability to empower the physical resources of a server to be built into multiple server machines virtually. In addition, the provision of the server is still using a single server, so that when a service failure caused by damage to its hardware or software components, the service availability to users will be disrupted. In this research will be developed the ability of server-based virtual server service and application of server failover as a technique in providing service availability. The method used in this research is through experimental approach and simulation is done by generating a number of request rate to the server. The process of testing and retrieving data is done by using several applications such as httperf generator, sysstat, and free. The result of this research is the percentage of processor utilization on native server, using average resource equal to 67.99%, while processor utilization on virtual server with 2 VM is about 43.73% average, so the processor level on the virtual server is lower than native server.
Keyword: failback, failover, native server, service availability, virtual server
ABSTRAK
Server yang memiliki kapasitas processor tinggi dan kemampuan teknologi virtualisasi umumnya belum sepenuhnya dimanfaatkan secara optimal karena hanya digunakan untuk menyediakan satu layanan aplikasi. Virtualisasi merupakan sebuah teknologi yang memiliki kemampuan dalam memberdayakan sumber daya fisik sebuah server untuk dibangun menjadi beberapa mesin server secara virtual. Selain itu, penyediaan server masih menggunakan server tunggal, sehingga ketika terjadi kegagalan layanan yang disebabkan adanya kerusakan pada komponen hardware atau software-nya, maka layanan ketersediaan (service availability) kepada users akan terganggu. Pada penelitian ini akan dikembangkan kemampuan layanan server berbasis server virtual dan penerapan failover server sebagai teknik dalam menyediakan ketersediaan layanan (service availability). Metode yang digunakan pada penelitian ini yaitu melalui pendekatan eksperimen dan dilakukan simulasi dengan membangkitkan sejumlah request rate ke server. Proses pengujian dan pengambilan data dilakukan dengan menggunakan beberapa aplikasi diantaranya httperf generator, sysstat, dan free. Hasil dari penelitian ini yaitu presentase utilisasi processor pada native server, menggunakan resources rata-rata sebesar 67.99%, sementara utilisasi processor pada virtual server dengan 2 VM sebesar rata-rata sekitar 43.73%, sehingga tingkat prosesor pada server virtual lebih rendah dari native server.
Kata kunci: failback, failover, native server, service availability, virtual serve
PERANCANGAN DAN IMPLEMENTASI PROXY SERVER SEBAGAI SOLUSI OPTIMALISASI PENGGUNAAN BANDWITH PADA JARINGAN INTERNET
ABSTRACT
The development of the Internet very rapidly when compared with other sectors, even in Indonesia itself, according to the Association of Indonesian Internet Service Provider (APJII) in 2014 predicted Internet users will amount to approximately 107 million people. The technology that supports the Internet both in terms of software or hardware is becoming more sophisticated and varied, making it easier for users to access various kinds of information in cyberspace. Bandwidth management is very important in determining the speed of data transfer in the Internet network. Proxy server functions can accelerate the process of Internet access, monitoring users and restrict users to visit the address Internet servers. In this research, the proxy server will be installed as the new ADSL modem then connected to a switch device and can be accessed by users on each network. With the help of SARG application, administratoristrators can also monitor the working of the client proxy server via a web browser. The result, after installing a proxy server, then the speed of Internet access and bandwidth usage on the network can be optimized.
Keywords : Bandwith, user, proxy server, ubuntu server, SARG
ABSTRAK
Perkembangan Internet yang sangat cepat bila dibandingkan dengan sektor lain, bahkan di Indonesia sendiri, menurut Asosiasi Penyedia Jasa Internet Indonesia (APJII) pada tahun 2014 pengguna internet diperkirakan akan berjumlah sekitar 107 juta orang. Teknologi yang mendukung Internet baik dari segi perangkat lunak atau perangkat keras menjadi lebih canggih dan beragam, sehingga memudahkan pengguna untuk mengakses berbagai macam informasi di dunia maya. Manajemen bandwidth sangat penting dalam menentukan kecepatan transfer data dalam jaringan internet. Fungsi server proxy dapat mempercepat proses akses internet, pemantauan pengguna dan membatasi pengguna untuk mengunjungi domain di Internet. Dalam penelitian ini, server proxy akan dipasang sebagai modem Asymmetric Digital Subscriber Line (ADSL), kemudian dihubungkan ke perangkat switch dan dapat diakses oleh pengguna pada setiap jaringan. Dengan bantuan aplikasi Squid Analysis Reports Generator (SARG), administratoristrator juga dapat memantau kerja dari server proxy klien melalui web browser. Hasilnya, setelah menginstal server proxy, maka kecepatan akses internet dan penggunaan bandwidth pada jaringan dapat dioptimalkan.
Kata kunci : Bandwith, user, proxy server, ubuntu server, SAR
REAL-TIME SURVEILLANCE SYSTEM MENGGUNAKAN PENCOCOKAN POLA METODE JACCARD
ABSTRAK
Ada banyak jenis kejahatan dari rendah ke tingkat tinggi asalkan ada kesempatan. Departemen kepolisian di setiap negara telah mencoba untuk mengurangi jumlah kejahatan ini, namun pada kenyataannya, jumlah kejahatan selalu tumbuh setiap tahun. Alih-alih menangkap kriminal, kita bisa meminimalkan kejahatan dengan menurunkan peluang tindakan pidana. Sebagai contoh, kita dapat menambahkan perangkat keamanan untuk melindungi aset kita. Kami mengusulkan sistem untuk mendeteksi jika ada seseorang memasuki ruangan dengan membandingkan pola setiap beberapa waktu. Ada banyak teknik pola yang cocok, tapi yang sederhana adalah dengan menghitung jarak dengan menggunakan Metode Jaccard. Jika ada pola yang berbeda dari pola sebelumnya yang tertangkap oleh webcam, sistem akan membuat alarm (suara dan simbol). Untuk tujuan ini, kita menggunakan aplikasi capture yang memiliki kemampuan untuk menangkap gambar secara berkala dan sistem yang membandingkan setiap gambar dari penangkapan sebelumnya. Hasil pengujian menunjukkan bahwa sistem yang diusulkan kita bisa mendeteksi setiap orang yang datang ke daerah kami webcam.
Kata Kunci: Surveillance, Pencocokan Pola, Jaccard
ABSTRACT
There are a lot of kinds of crime from low to high level as long as there is a chance. The police department in every country has tried to decrease crime's number, but in fact, the crime's number always grows every year. Instead of catching the criminal, we can minimize the crime by lowering the opportunity of criminal's action. For example, we can add a security device to protect our assets. We proposed the system to detect if there is someone entering the room by comparing pattern every couple of time. There are many pattern matching techniques, but the simple one is by counting its distance using Jaccard Method. If there is a different pattern from previous pattern that caught by a webcam, the system will create an alarm (sound and symbols). For these purpose, we use a capture application whose ability to capture an image periodically and the system that compare every image from previous capture. Testing result has shown that our proposed system could detect every people that come to the area of our webcam.
Keywords: Surveillance, Pattern Matching, Jaccar
Real-time Surveillance System Menggunakan Pencocokan Pola Metode Jaccard
There are a lot of kinds of crime from low to high level as long as there is a chance. The police department in every country has tried to decrease crime's number, but in fact, the crime's number always grows every year. Instead of catching the criminal, we can minimize the crime by lowering the opportunity of criminal's action. For example, we can add a security device to protect our assets. We proposed the system to detect if there is someone entering the room by comparing pattern every couple of time. There are many pattern matching techniques, but the simple one is by counting its distance using Jaccard Method. If there is a different pattern from previous pattern that caught by a webcam, the system will create an alarm (sound and symbols). For these purpose, we use a capture application whose ability to capture an image periodically and the system that compare every image from previous capture. Testing result has shown that our proposed system could detect every people that come to the area of our webcam.
Keywords: Surveillance, Pattern Matching, Jaccar
Service Availability dan Performa Sumber Daya Prosessor pada Infrastruktur Server Virtual
Server that have high processor capacity and virtualization technology capabilities are generally not fully utilized optimally as they are only used to provide one application service. Virtualization is a technology that has the ability to empower the physical resources of a server to be built into multiple server machines virtually. In addition, the provision of the server is still using a single server, so that when a service failure caused by damage to its hardware or software components, the service availability to users will be disrupted. In this research will be developed the ability of server-based virtual server service and application of server failover as a technique in providing service availability. The method used in this research is through experimental approach and simulation is done by generating a number of request rate to the server. The process of testing and retrieving data is done by using several applications such as httperf generator, sysstat, and free. The result of this research is the percentage of processor utilization on native server, using average resource equal to 67.99%, while processor utilization on virtual server with 2 VM is about 43.73% average, so the processor level on the virtual server is lower than native server.
Keyword: failback, failover, native server, service availability, virtual server
 
Real-time Surveillance System Menggunakan Pencocokan Pola Metode Jaccard
Ada banyak jenis kejahatan dari rendah ke tingkat tinggi asalkan ada kesempatan. Departemen kepolisian di setiap negara telah mencoba untuk mengurangi jumlah kejahatan ini, namun pada Kenyataannya, jumlah kejahatan selalu tumbuh setiap tahun. Alih-alih menangkap kriminal, kita bisa meminimalkan kejahatan dengan menurunkan peluang tindakan pidana. Sebagai contoh, kita dapat menambahkan perangkat keamanan untuk melindungi aset kita. Kami mengusulkan sistem untuk mendeteksi jika ada seseorang memasuki ruangan dengan membandingkan pola setiap beberapa waktu. Ada banyak teknik pola yang cocok, tapi yang sederhana adalah dengan menghitung jarak dengan menggunakan Euclidean normal. Jika ada pola yang berbeda dari pola sebelumnya yang tertangkap oleh webcam, sistem akan membuat alarm (suara dan simbol). Untuk tujuan ini, kita menggunakan aplikasi capture yang memiliki kemampuan untuk menangkap gambar secara berkala dan sistem yang membandingkan setiap gambar dari penangkapan sebelumnya. Hasil pengujian menunjukkan bahwa sistem yang diusulkan kita bisa mendeteksi setiap orang yang datang ke daerah kami webcam. Kata Kunci: Surveillance, Pencocokan Pola, Jaccard There are a lot of kinds of crime from low to high level as long as there is a chance. The police department in every country has tried to decrease crime's number, but in fact, the crime's number always grows every year. Instead of catching the criminal, we can minimize the crime by lowering the opportunity of criminal's action. For example, we can add a security device to protect our assets. We proposed the system to detect if there is someone entering the room by comparing pattern every couple of time. There are many pattern matching techniques, but the simple one is by counting its distance using Normal Euclidean. If there is a different pattern from previous pattern that caught by a webcam, the system will create an alarm (sound and symbols). For these purpose, we use a capture application whose ability to capture an image periodically and the system that compare every image from previous capture. Testing result has shown that our proposed system could detect every people that come to the area of our webcam
Perancangan dan Implementasi Proxy Server sebagai Solusi Optimalisasi Penggunaan Bandwith pada Jaringan Internet
The development of the Internet very rapidly when compared with other sectors, even in Indonesia itself, according to the Association of Indonesian Internet Service Provider (APJII) in 2014 predicted Internet users will amount to approximately 107 million people. The technology that supports the Internet both in terms of software or hardware is becoming more sophisticated and varied, making it easier for users to access various kinds of information in cyberspace. Bandwidth management is very important in determining the speed of data transfer in the Internet network. Proxy server functions can accelerate the process of Internet access, monitoring users and restrict users to visit the address Internet servers. In this research, the proxy server will be installed as the new ADSL modem then connected to a switch device and can be accessed by users on each network. With the help of SARG application, administratoristrators can also monitor the working of the client proxy server via a web browser. The result, after installing a proxy server, then the speed of Internet access and bandwidth USAge on the network can be optimized.
Keywords : Bandwith, user, proxy server, ubuntu server, SARG
 
Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik
Pemanfaatan teknologi komunikasi dan informasi perlu diterapkan pada instansi yang saat ini masih menggunakan sistem manual dan mengharuskan administrator untuk mengakses router dan memantau traffic internet secara langsung pada server. Virtual private network bersifat private dimana pada dasarnya jaringan ini tidak ada secara fisik, namun hanya berupa jaringan virtual, sehingga tidak semua orang dapat mengaksesnya. Selain jaringan internet, virtual private network juga diperlukan oleh perusahaan sebagai jaringan pribadi dengan jalur khusus yang bersifat lebih aman untuk mengakses jaringan lokal perusahaan dan memantau traffic internet pada router perusahaan dari jarak jauh. Perancangan virtual private network ini dilakukan dengan metode point-to-point tunneling protocol. Setelah dilakukan perancangan dan implementasi dapat disimpulkan bahwa virtual private network memiliki sistem kerja mengenkripsi semua data yang berada di jaringan instansi atau perusahaan, sehingga jalur komunikasi dengan jaringan publik menjadi lebih aman dan pihak lain diluar administrator tidak dapat mengetahui informasi yang berada dalam jaringan perusahaan
Sistem Keamanan Pada Jaringan Wireless Menggunakan Protokol RADIUS
Wireless networks require a security system to protect servers from attacks such as Port Scanning and Denial of Service. This research aims to design a wireless network security system using Remote Authentication Dial-In User Service or RADIUS protocol. The research stages include analysis of system requirements, preparation of completeness of system requirements, installation and configuration of the network and RADIUS protocol, detection and prevention testing of attacks, and analysis of test results. The design system used is to implement a single authentication, authorization, and accounting protocol that supports the internal and external networks of the Bahana Taruko Santosa Company. The results of implementing the RADIUS protocol on a wireless network server service can perform a DoS attack filter properly and block unauthorized users from accessing Internet services. Data analysis results show DoS attacks with the type of ICMP Flooding attack and UDP Flooding attack can be blocked with a percentage of 98%. In addition, there is a reduction in unauthenticated user access rights with the result of reducing the amount of bandwidth usage
Perancangan dan Implementasi Virtualisasi Server Menggunakan Proxmox Ve 3.4
Server is a media that has an important role to provide internet access services for its users. In order for the network can be utilized optimally then the required server. This study aims to design server virtualization software collaboration faculty unisma techniques bekasi with the aim of building efficient server infrastructure, flexible and optimize the use of resources, so it can be adjusted with the workload for hardware resources to be optimal. This research is done by using virtualization concept that is using proxmox to design virtual server which can minimize cost and maintenance in hardware procurement. The use of hardware resources provided by the server machine has not been used optimally, so efficient steps are needed to resolve this issue. The results obtained from the design of the system in the form of server virtualization using proxmox, as well as optimizing the use of resources and manage the server efficiently in terms of time and cost.
Keyword : Server, Optimization, Virtualization, Proxmox, Design & Implementation.