36 research outputs found

    SERVICE AVAILABILITY DAN PERFORMA SUMBER DAYA PROSESSOR PADA INFRASTRUKTUR SERVER VIRTUAL

    Get PDF
    ABSTRACT   Server that have high processor capacity and virtualization technology capabilities are generally not fully utilized optimally as they are only used to provide one application service. Virtualization is a technology that has the ability to empower the physical resources of a server to be built into multiple server machines virtually. In addition, the provision of the server is still using a single server, so that when a service failure caused by damage to its hardware or software components, the service availability to users will be disrupted. In this research will be developed the ability of server-based virtual server service and application of server failover as a technique in providing service availability. The method used in this research is through experimental approach and simulation is done by generating a number of request rate to the server. The process of testing and retrieving data is done by using several applications such as httperf generator, sysstat, and free. The result of this research is the percentage of processor utilization on native server, using average resource equal to 67.99%, while processor utilization on virtual server with 2 VM is about 43.73% average, so the processor level on the virtual server is lower than native server.   Keyword: failback, failover, native server, service availability, virtual server     ABSTRAK   Server yang memiliki kapasitas processor tinggi dan kemampuan teknologi virtualisasi umumnya belum sepenuhnya dimanfaatkan secara optimal karena hanya digunakan untuk menyediakan satu layanan aplikasi. Virtualisasi merupakan sebuah teknologi yang memiliki kemampuan dalam memberdayakan sumber daya fisik sebuah server untuk dibangun menjadi beberapa mesin server secara virtual. Selain itu, penyediaan server masih menggunakan server tunggal, sehingga ketika terjadi kegagalan layanan yang disebabkan adanya kerusakan pada komponen hardware atau software-nya, maka layanan ketersediaan (service availability) kepada users akan terganggu. Pada penelitian ini akan dikembangkan kemampuan layanan server berbasis server virtual dan penerapan failover server sebagai teknik dalam menyediakan ketersediaan layanan (service availability). Metode yang digunakan pada penelitian ini yaitu melalui pendekatan eksperimen dan dilakukan simulasi dengan membangkitkan sejumlah request rate ke server. Proses pengujian dan pengambilan data dilakukan dengan menggunakan beberapa aplikasi diantaranya httperf generator, sysstat, dan free. Hasil dari penelitian ini yaitu presentase utilisasi processor pada native server, menggunakan resources rata-rata sebesar 67.99%, sementara utilisasi processor pada virtual server dengan 2 VM sebesar rata-rata sekitar 43.73%, sehingga tingkat prosesor pada server virtual lebih rendah dari native server.   Kata kunci: failback, failover, native server, service availability, virtual serve

    PERANCANGAN DAN IMPLEMENTASI PROXY SERVER SEBAGAI SOLUSI OPTIMALISASI PENGGUNAAN BANDWITH PADA JARINGAN INTERNET

    Get PDF
    ABSTRACT   The development of the Internet very rapidly when compared with other sectors, even in Indonesia itself, according to the Association of Indonesian Internet Service Provider (APJII) in 2014 predicted Internet users will amount to approximately 107 million people. The technology that supports the Internet both in terms of software or hardware is becoming more sophisticated and varied, making it easier for users to access various kinds of information in cyberspace. Bandwidth management is very important in determining the speed of data transfer in the Internet network. Proxy server functions can accelerate the process of Internet access, monitoring users and restrict users to visit the address Internet servers. In this research, the proxy server will be installed as the new ADSL modem then connected to a switch device and can be accessed by users on each network. With the help of SARG application, administratoristrators can also monitor the working of the client proxy server via a web browser. The result, after installing a proxy server, then the speed of Internet access and bandwidth usage on the network can be optimized.   Keywords : Bandwith, user, proxy server, ubuntu server, SARG     ABSTRAK   Perkembangan Internet yang sangat cepat bila dibandingkan dengan sektor lain, bahkan di Indonesia sendiri, menurut Asosiasi Penyedia Jasa Internet Indonesia (APJII) pada tahun 2014 pengguna internet diperkirakan akan berjumlah sekitar 107 juta orang. Teknologi yang mendukung Internet baik dari segi perangkat lunak atau perangkat keras menjadi lebih canggih dan beragam, sehingga memudahkan pengguna untuk mengakses berbagai macam informasi di dunia maya. Manajemen bandwidth sangat penting dalam menentukan kecepatan transfer data dalam jaringan internet. Fungsi server proxy dapat mempercepat proses akses internet, pemantauan pengguna dan membatasi pengguna untuk mengunjungi domain di Internet. Dalam penelitian ini, server proxy akan dipasang sebagai modem Asymmetric Digital Subscriber Line (ADSL), kemudian dihubungkan ke perangkat switch dan dapat diakses oleh pengguna pada setiap jaringan. Dengan bantuan aplikasi Squid Analysis Reports Generator (SARG), administratoristrator juga dapat memantau kerja dari server proxy klien melalui web browser. Hasilnya, setelah menginstal server proxy, maka kecepatan akses internet dan penggunaan bandwidth pada jaringan dapat dioptimalkan.   Kata kunci : Bandwith, user, proxy server, ubuntu server, SAR

    REAL-TIME SURVEILLANCE SYSTEM MENGGUNAKAN PENCOCOKAN POLA METODE JACCARD

    Get PDF
    ABSTRAK   Ada banyak jenis kejahatan dari rendah ke tingkat tinggi asalkan ada kesempatan. Departemen kepolisian di setiap negara telah mencoba untuk mengurangi jumlah kejahatan ini, namun pada kenyataannya, jumlah kejahatan selalu tumbuh setiap tahun. Alih-alih menangkap kriminal, kita bisa meminimalkan kejahatan dengan menurunkan peluang tindakan pidana. Sebagai contoh, kita dapat menambahkan perangkat keamanan untuk melindungi aset kita. Kami mengusulkan sistem untuk mendeteksi jika ada seseorang memasuki ruangan dengan membandingkan pola setiap beberapa waktu. Ada banyak teknik pola yang cocok, tapi yang sederhana adalah dengan menghitung jarak dengan menggunakan Metode Jaccard. Jika ada pola yang berbeda dari pola sebelumnya yang tertangkap oleh webcam, sistem akan membuat alarm (suara dan simbol). Untuk tujuan ini, kita menggunakan aplikasi capture yang memiliki kemampuan untuk menangkap gambar secara berkala dan sistem yang membandingkan setiap gambar dari penangkapan sebelumnya. Hasil pengujian menunjukkan bahwa sistem yang diusulkan kita bisa mendeteksi setiap orang yang datang ke daerah kami webcam.   Kata Kunci: Surveillance, Pencocokan Pola, Jaccard     ABSTRACT   There are a lot of kinds of crime from low to high level as long as there is a chance. The police department in every country has tried to decrease crime's number, but in fact, the crime's number always grows every year. Instead of catching the criminal, we can minimize the crime by lowering the opportunity of criminal's action. For example, we can add a security device to protect our assets. We proposed the system to detect if there is someone entering the room by comparing pattern every couple of time. There are many pattern matching techniques, but the simple one is by counting its distance using Jaccard Method. If there is a different pattern from previous pattern that caught by a webcam, the system will create an alarm (sound and symbols). For these purpose, we use a capture application whose ability to capture an image periodically and the system that compare every image from previous capture. Testing result has shown that our proposed system could detect every people that come to the area of our webcam.   Keywords: Surveillance, Pattern Matching, Jaccar

    Real-time Surveillance System Menggunakan Pencocokan Pola Metode Jaccard

    Full text link
      There are a lot of kinds of crime from low to high level as long as there is a chance. The police department in every country has tried to decrease crime's number, but in fact, the crime's number always grows every year. Instead of catching the criminal, we can minimize the crime by lowering the opportunity of criminal's action. For example, we can add a security device to protect our assets. We proposed the system to detect if there is someone entering the room by comparing pattern every couple of time. There are many pattern matching techniques, but the simple one is by counting its distance using Jaccard Method. If there is a different pattern from previous pattern that caught by a webcam, the system will create an alarm (sound and symbols). For these purpose, we use a capture application whose ability to capture an image periodically and the system that compare every image from previous capture. Testing result has shown that our proposed system could detect every people that come to the area of our webcam.   Keywords: Surveillance, Pattern Matching, Jaccar

    Service Availability dan Performa Sumber Daya Prosessor pada Infrastruktur Server Virtual

    Full text link
      Server that have high processor capacity and virtualization technology capabilities are generally not fully utilized optimally as they are only used to provide one application service. Virtualization is a technology that has the ability to empower the physical resources of a server to be built into multiple server machines virtually. In addition, the provision of the server is still using a single server, so that when a service failure caused by damage to its hardware or software components, the service availability to users will be disrupted. In this research will be developed the ability of server-based virtual server service and application of server failover as a technique in providing service availability. The method used in this research is through experimental approach and simulation is done by generating a number of request rate to the server. The process of testing and retrieving data is done by using several applications such as httperf generator, sysstat, and free. The result of this research is the percentage of processor utilization on native server, using average resource equal to 67.99%, while processor utilization on virtual server with 2 VM is about 43.73% average, so the processor level on the virtual server is lower than native server.   Keyword: failback, failover, native server, service availability, virtual server   &nbsp

    Real-time Surveillance System Menggunakan Pencocokan Pola Metode Jaccard

    Full text link
    Ada banyak jenis kejahatan dari rendah ke tingkat tinggi asalkan ada kesempatan. Departemen kepolisian di setiap negara telah mencoba untuk mengurangi jumlah kejahatan ini, namun pada Kenyataannya, jumlah kejahatan selalu tumbuh setiap tahun. Alih-alih menangkap kriminal, kita bisa meminimalkan kejahatan dengan menurunkan peluang tindakan pidana. Sebagai contoh, kita dapat menambahkan perangkat keamanan untuk melindungi aset kita. Kami mengusulkan sistem untuk mendeteksi jika ada seseorang memasuki ruangan dengan membandingkan pola setiap beberapa waktu. Ada banyak teknik pola yang cocok, tapi yang sederhana adalah dengan menghitung jarak dengan menggunakan Euclidean normal. Jika ada pola yang berbeda dari pola sebelumnya yang tertangkap oleh webcam, sistem akan membuat alarm (suara dan simbol). Untuk tujuan ini, kita menggunakan aplikasi capture yang memiliki kemampuan untuk menangkap gambar secara berkala dan sistem yang membandingkan setiap gambar dari penangkapan sebelumnya. Hasil pengujian menunjukkan bahwa sistem yang diusulkan kita bisa mendeteksi setiap orang yang datang ke daerah kami webcam. Kata Kunci: Surveillance, Pencocokan Pola, Jaccard There are a lot of kinds of crime from low to high level as long as there is a chance. The police department in every country has tried to decrease crime's number, but in fact, the crime's number always grows every year. Instead of catching the criminal, we can minimize the crime by lowering the opportunity of criminal's action. For example, we can add a security device to protect our assets. We proposed the system to detect if there is someone entering the room by comparing pattern every couple of time. There are many pattern matching techniques, but the simple one is by counting its distance using Normal Euclidean. If there is a different pattern from previous pattern that caught by a webcam, the system will create an alarm (sound and symbols). For these purpose, we use a capture application whose ability to capture an image periodically and the system that compare every image from previous capture. Testing result has shown that our proposed system could detect every people that come to the area of our webcam

    Perancangan dan Implementasi Proxy Server sebagai Solusi Optimalisasi Penggunaan Bandwith pada Jaringan Internet

    Full text link
      The development of the Internet very rapidly when compared with other sectors, even in Indonesia itself, according to the Association of Indonesian Internet Service Provider (APJII) in 2014 predicted Internet users will amount to approximately 107 million people. The technology that supports the Internet both in terms of software or hardware is becoming more sophisticated and varied, making it easier for users to access various kinds of information in cyberspace. Bandwidth management is very important in determining the speed of data transfer in the Internet network. Proxy server functions can accelerate the process of Internet access, monitoring users and restrict users to visit the address Internet servers. In this research, the proxy server will be installed as the new ADSL modem then connected to a switch device and can be accessed by users on each network. With the help of SARG application, administratoristrators can also monitor the working of the client proxy server via a web browser. The result, after installing a proxy server, then the speed of Internet access and bandwidth USAge on the network can be optimized.   Keywords : Bandwith, user, proxy server, ubuntu server, SARG   &nbsp

    Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik

    Get PDF
    Pemanfaatan teknologi komunikasi dan informasi perlu diterapkan pada instansi yang saat ini masih menggunakan sistem manual dan mengharuskan administrator untuk mengakses router dan memantau traffic internet secara langsung pada server. Virtual private network bersifat private dimana pada dasarnya jaringan ini tidak ada secara fisik, namun hanya berupa jaringan virtual, sehingga tidak semua orang dapat mengaksesnya. Selain jaringan internet, virtual private network juga diperlukan oleh perusahaan sebagai jaringan pribadi dengan jalur khusus yang bersifat lebih aman untuk mengakses jaringan lokal perusahaan dan memantau traffic internet pada router perusahaan dari jarak jauh. Perancangan virtual private network ini dilakukan dengan metode point-to-point tunneling protocol. Setelah dilakukan perancangan dan implementasi  dapat disimpulkan bahwa virtual private network memiliki sistem kerja mengenkripsi semua data yang berada di jaringan instansi atau perusahaan, sehingga jalur komunikasi dengan jaringan publik menjadi lebih aman dan pihak lain diluar administrator tidak dapat mengetahui informasi yang berada dalam jaringan perusahaan

    Sistem Keamanan Pada Jaringan Wireless Menggunakan Protokol RADIUS

    Get PDF
    Wireless networks require a security system to protect servers from attacks such as Port Scanning and Denial of Service. This research aims to design a wireless network security system using Remote Authentication Dial-In User Service or RADIUS protocol. The research stages include analysis of system requirements, preparation of completeness of system requirements, installation and configuration of the network and RADIUS protocol, detection and prevention testing of attacks, and analysis of test results. The design system used is to implement a single authentication, authorization, and accounting protocol that supports the internal and external networks of the Bahana Taruko Santosa Company. The results of implementing the RADIUS protocol on a wireless network server service can perform a DoS attack filter properly and block unauthorized users from accessing Internet services. Data analysis results show DoS attacks with the type of ICMP Flooding attack and UDP Flooding attack can be blocked with a percentage of 98%. In addition, there is a reduction in unauthenticated user access rights with the result of reducing the amount of bandwidth usage

    Perancangan dan Implementasi Virtualisasi Server Menggunakan Proxmox Ve 3.4

    Full text link
      Server is a media that has an important role to provide internet access services for its users. In order for the network can be utilized optimally then the required server. This study aims to design server virtualization software collaboration faculty unisma techniques bekasi with the aim of building efficient server infrastructure, flexible and optimize the use of resources, so it can be adjusted with the workload for hardware resources to be optimal. This research is done by using virtualization concept that is using proxmox to design virtual server which can minimize cost and maintenance in hardware procurement. The use of hardware resources provided by the server machine has not been used optimally, so efficient steps are needed to resolve this issue. The results obtained from the design of the system in the form of server virtualization using proxmox, as well as optimizing the use of resources and manage the server efficiently in terms of time and cost.   Keyword : Server, Optimization, Virtualization, Proxmox, Design & Implementation. &nbsp
    corecore