19 research outputs found

    PERFORMANCE ANALYSIS OF PACKET SCHEDULING WITH QoS IN IEEE 802.16e NETWORKS

    Get PDF
    ABSTRAKSI: Akhir-akhir ini WiMAX (Worldwide Interoperability for Microwave Access) telah dianggap sebagai teknologi nirkabel tercepat dengan akses broadband yang disediakan pada area Metropolitan Local Networks (WMAN). Ketertarikan terhadap Broadband Wireless Access (BWA) meningkat karena mobilitas pengguna dan kebutuhan akan akses data multimedia disaat kapanpun. IEEE 802.16e yang berbasis jaringan WiMAX dapat menyediakan kualitas yang lebih baik bagi pengguna layanan data mobile. Masalah utama pada IEEE 802.16e adalah belum adanya definisi yang spesifik untuk penjadwalan paket dan referensi khusus. Sampai sekarang masalah ini menjadi masalah terbuka bagi peneliti.Termasuk di dalam standar IEEE 802.16e, adalah spesifikasi untuk layer Medium Access Control (MAC) dan physical (PHY) dalam mengatur kebutuhan beragam aplikasi yang menggunakan kriteria QoS yang berbeda-beda, yang diantaranya adalah Unsolicited Grant Service (UGS), Real-Time Polling Service (RTPS), Extended Real-Time Polling Service (eRTPS), Non-Real-Time Polling Service (nRTPS), dan Best Effort (BE). Thesis ini mengajukan Modified WFQ yang akan diuji berdasarkankan algoritma yang sudah ada yaitu Weighted Round Robin (WRR) dan Weighted Fair Queueing (WFQ). Performansi MWFQ diuji menggunakan kelima kriteria QoS diatas.Kata Kunci : Penjadwalan Paket, WRR, WFQ, MWFQ, dan QoS.ABSTRACT: Recently, WiMAX (Worldwide Interoperability for Microwave Access) has been claimed as the fastest wireless technology of broadband access provided at Wireless Metropolitan Local Networks (WMAN) area. The interest on Broadband Wireless Access (BWA) is increasing because of user mobility and demand of multimedia data access anytime. IEEE 802.16e based on WiMAX networking is able to provide better quality for mobile data service user. The main problem of 802.16e is that there are no specific definitions for packet scheduling and specific reference. Until now, this has been an open issue for researchers.IEEE 802.16e standard includes specification for Medium Access Control (MAC) and Physical (PHY) layer designed to handle the needs of different applications with variety types of QoS criteria, which are Unsolicited Grant Service (UGS), Real-Time Polling Service (RTPS), Extended Real-Time Polling Service (eRTPS), Non-Real-Time Polling Service (nRTPS), and Best Effort (BE). This thesis proposed Modified WFQ which was based on Weighted Round Robin (WRR) and Weighted Fair Queuing (WFQ). The performance of MWFQ was assessed by using five QoS above.Keyword: Packet Scheduling, WRR, WFQ, MWFQ, and QoS

    A Novel Android Memory Forensics for Discovering Remnant Data

    Get PDF
    As recently updated on the vulnerability statistics shown in 2019, Android-driven smartphones, tablet PCs, and other Android devices are vulnerable, whether from internal or external threats. Most users store sensitive data like emails, photos, cloud storage access, and contact lists on Android smartphones. This information holds a growing-importance for the digital investigation process of mobile devices, e.g., internal memory or random-access memory (RAM) forensics, or external memory or read-only memory (ROM) forensics on Android smartphones. Internal memory retrieval is considered flawed and difficult by some researchers as it alters the digital evidence in an intrusive way. On the other hand, external memory retrieval also called logical acquisition that implies the image of logical storage items (e.g., files, database, directories, etc.) that locate on logical storage. This research provides a novel methodology that focuses only on internal memory forensic in a forensically sound manner. This research also contributes two algorithms, e.g., collect raw information (CRI) for parsing the raw data, and investigate raw information (IRI) for extracting the digital evidence to be more readable. This research conducted with fourteenth events to be analyzed, and each event was captured by SHA-1 as digital evidence. By using GDrive as the case study, the authors concluded that the proposed methodology could be used as guidance by forensics analyst(s), cyberlaw practitioner(s), and expert witness(es) in the court

    ANALISIS PERBANDINGAN PERFORMANSI DISIPLIN ANTRIAN PRIORITY (PRIO) DAN HIERARCHICAL TOKEN BUCKET (HTB) UNTUK PENANGANAN QoS PADA JARINGAN TCP/IP

    Get PDF
    ABSTRAKSI: Manajemen bandwidth mampu memberikan garansi bagi jaringan dengan multi layanan pada masing-masing user. Setiap user dalam suatu jaringan khususnya Local Area Network (LAN) dapat diatur dalam pengalokasiaan bandwidth yang adil dan sesuai dengan standar yang ada. Semakin banyak dan bervariasinya aplikasi yang dapat dilayani oleh suatu jaringan berpengaruh pada pengguna link dalam jaringan tersebut. Link-link yang ada harus mampu menangani kebutuhan user akan aplikasi tesebut bahkan dalam keadaan kongesti sekalipun, harus ada suatu jaminan bahwa link tetap dapat berfungsi sebagaimana mestinya walaupun terjadi ledakan permintaan aplikasi. Masing-masing user dalam LAN memiliki alokasi bandwidth sehingga dalam penggunaan bandwidth yang terbatas, tidak terjadi penggunaan bandwidth yang besar oleh satu user yang tidak terkendali.Manajemen bandwidth memegang perananan penting dalam mengatur penggunaan bandwidth yang tak terkendali dengan penanganan QoS. Dalam mengatur jenis aplikasi yang bisa mengakses link yang ada manajemen bandwidth mampu memberikan garansi kepada aplikasi yang mendapat alokasi bandwidth untuk terus mengirimkan data sesuai dengan alokasinya sekalipun terjadi kemacetan dalam jaringan. Selain itu juga, dalam keadaan tertentu ketika alokasi bandwidth yang dimiliki oleh suatu aplikasi/layanan tidak digunakan sekaligus mengoptimalkan penggunaan link yang ada.Priority (PRIO) dan Hierarchical Token Bucket (HTB) sebagai implementator manajemen bandwidth yang tersedia secara gratis dan dapat dijalankan diatas sistem operasi Linux merupakan suatu metode disiplin antrian classful yang layak dianalisa keunggulan dan kelemahannya. Kedua metode tersebut digunakan untuk membagi alokasi bandwidth berdasarkan jenis protokol yaitu HTTP, FTP, SMTP, dan SSH. Dengan menerapkan kedua metode tersebut diharapkan pada alokasi bandwidth yang tidak terpakai dapat dipinjamkan sehingga alokasi bandwidth yang tidak terpakai tidak terbuang dengan sia-sia. Hal ini dapat dianalisa manakah yang lebih optimal dengan penanganan QoS dari kedua metode classful tersebut. Oleh karena itu tulisan ini lebih menitik beratkan pada perbandingan performanasi manakah yang lebih baik antara PRIO dan HTB untuk penanganan QoS pada jaringan TCP/IPKata Kunci : Manajemen Bandwidth, Penanganan QoS, PRIO, dan HTB.ABSTRACT: Bandwidth management gives guarantee for network with multi service on each user. Each user on a network, especially LAN, can be managed in a fair bandwidth allocation and according to the standard that used. The more quantity and the more vary applications that a network can handle impact on the link user on the network. The existence links should be able to handle the need of user to an application, even in the congestion, should there be guarantee that the links will functionally working even if there is a booming on an application demand. Each user on LAN has own bandwidth allocation, so in the limited usage of bandwidth, there will not be a huge bandwidth usage by uncontrolled user.Bandwidth management holds important part in managing the uncontrolled bandwidth used with QoS handling. In arranging the kind of application that could access the link that exists, bandwidth management could give guarantee to the applicants which got the bandwidth allocation to continue on sending the data according to his allocation even tough there is traffic on the network. Besides that, in a certain circumstances when the bandwidth allocation that belongs to application (service) could not be used to optimally the existence links.PRIO and HTB as the implementation of bandwidth management which is free and could be used on Linux operating system is a classful queue method that deserved to be analyzed the benefit and the weakness of it. Both of those methods used to share bandwidth allocation based on protocols such as HTTP, FTP, SMTP, and SSH. By implementing those methods hopefully unused bandwidth allocation could be shared so that it will not be useful. It can be analyzed which is more optimum from classful methods. This writing is intended to reveal which performance better between PRIO and HTB for QoS handling in the TCP/IP network.Keyword: Bandwidth Management, QoS Handling, PRIO, and HTB

    Analisis Forensik Android: Artefak pada Aplikasi Penyimpanan Awan Box

    Get PDF
    Sistem penyimpanan melalui cloud memiliki banyak keunggulan, seperti kemampuan akses dari lokasi manapun serta kemudahan penyimpanan pencadangan file-file pada komputer dan smartphone. Terdapat banyak pilihan layanan penyimpanan melalui cloud, seperti Dropbox, Microsoft OneDrive, Google Drive, dan Box. Dari beberapa jenis layanan peyimpanan tersebut Box adalah satu-satunya layanan penyimpanan cloud yang mampu menjamin tingkat reliability uptime hingga 99.9%. Awalnnya, Box hanya ditujukan untuk kegiatan bisnis saja, namun sekarang Box dapat digunakan oleh pengguna secara umum. Selain memberikan pengaruh yang positif, pertumbuhan penggunaan teknologi layanan penyimpanan cloud juga telah memberikan peningkatan dalam peluang terjadinya kejahatan di dunia maya. Forensik digital merupakan solusi terbaru dalam mengamati keamanan sistem dan jaringan, sementara forensik bergerak adalah pengembangan forensic digital yang sepenuhnya difokuskan pada media smartphone. Forensik bergerak dapat dilakukan dalam dua sisi, yaitu server dan client. Studi kasus dalam penelitian ini berfokus pada penggunaan smartphone OS Android yang terinstal Box sebagai layanan penyimpanan cloud. Sedangkan tujuan utama dari penelitian ini adalah untuk menyediakan sebuah metode forensik bergerak untuk menemukan artefak pada smartphone Android yang telah terinstal dengan aplikasi Box.AbstractStoring files in a cloud has many advantages, such as the ability to access them from any location and to keep backups of those files on computers and smartphones. There are many choices for cloud storage services, such as Dropbox, Microsoft OneDrive, Google Drive, and Box. Of these, Box is the only cloud storage service that guarantees uptime reliability 99.99% of the time. At first, Box was intended for business use only, but now it is also freely available for public use. Growth in cloud storage technology use has also resulted in increased opportunities for cybercrime to take place. Digital forensics is the latest solution for system and network security observers, while mobile forensics is a development of digital forensics that is fully focused on smartphone media. Mobile forensics can be performed on both the server and client sides. In this research, mobile forensics was performed on the client side. The case study in this paper focused on an Android operating system (OS) smartphone using Box cloud storage. The purpose of this study was to provide a mobile forensics method for finding artifacts on smartphones that have a Box application installed

    Online Marketing Education and Application Development for MSMEs in Buah Batu District Bandung

    Get PDF
    In today's fast-paced world of information and technology, it's impossible to do anything without a connection to the internet. Due to the rising level of competition in the market, small and medium-sized businesses (SMEs) that are owned and operated by business people need to make use of digital media to raise their brands' visibility and hence their competitiveness. In order to help MSME actors in Buah Batu District continue to grow and develop, the mentorship program for selected partners aims to assist them in developing innovative goods. The MSME actors in Buah Batu District are likely to benefit from assistance related to the district's online web platform, which has been established. It has been determined that in order to help MSME actors (including those designing product labels and packaging) learn about online marketing, the team will offer online marketing education workshops. They will also develop a better product website, integrate the site with helpful applications, and create an updated database system that can be relied upon

    Implementation of Centralized Networking System and Integrated Marketing Communication for MSMEs in Buah Batu Bandung

    Get PDF
    Network security is very important, especially for community service units because a damaged system can affect other systems. Therefore, it is necessary to design and develop a computer network system and security that’s more centralized. Promotional activities are very important to be carried out by every business from the smallest scope to even large companies, because no matter how good the quality of the products the company has, it will not be successful for sale without proper promotion. Referring to the situation and problems faced by partners, our group took the initiative to contribute by providing several alternative solutions whose goals are expected to be useful for partners, by providing training on the implementation of integrated networks and MSME database management, then providing an integrated marketing communication training, workshop on communication marketing tools that can provide a competitive advantage for MSMEs so that MSME marketing tools in Buah Batu District have superior value. With some of the solutions that we offer, the expected final results from this community service activity are network problems and database management can be resolved properly. Furthermore, MSMEs in Buah Batu District have standardized and attractive printed and digital marketing tools
    corecore