Claim Missing Document
Check
Articles

Found 8 Documents
Search

Peningkatan Kinerja Jaringan Komputer dengan Border Gateway Protocol (BGP) dan Dynamic Routing (Studi Kasus PT Estiko Ramanda) Ernawati, Tati; Endrawan, Jemi
Khazanah Informatika Vol. 4 No. 1 Juni 2018
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v4i1.5656

Abstract

Routing dalam jaringan menjadi elemen utama karena merupakan proses pemilihan salah satu dari beberapa kemungkinan jalur pengiriman paket data dari alamat pengirim ke alamat tujuan. Protokol routing diperlukan untuk membentuk tabel routing berdasarkan informasi routing yang dipertukarkan setiap selang waktu tertentu sehingga pengalamatan pada paket data yang akan dikirim menjadi lebih jelas. Penelitian ini membangun dan mengkaji kinerja jaringan komputer (computer network performance) pada studi kasus di perusahaan yang bergerak dibidang jasa layanan internet, peningkatan kebutuhan jasa layanan internet menuntut adanya pengelolaan jaringan internal di perusahaan dalam upaya peningkatan kinerja jaringan komputer. Pengujian dilakukan pada parameter latency dan traceroute menggunakan metode dynamic routing Border Gateway Protocol? (BGP). Hasil uji menunjukkan sistem jaringan komputer dengan BGP memiliki efisiensi jaringan yang tinggi dengan rata-rata latency 0 ms (82 ms tanpa BGP) dan traceroute (konten lokal) 4 hop (8 hop tanpa BGP), namun traceroute (kontel non lokal) memiliki nilai presentase yang sama dikarenakan seluruh prefix non lokal harus diperoleh dari port backbone (port lama tanpa BGP).
ANALISIS VISUALISASI DATA KEAMANAN JARINGAN Ernawati, Tati
Jurnal Teknologi Vol 5 No 1 (2012): Jurnal Teknologi
Publisher : Jurnal Teknologi, Fakultas Teknologi Industri, Institut Sains & Teknologi AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aktivitas monitoring keamanan jaringan akan menjadi masalah besar apabila data yang diolah sangat banyak sementara alat analisis yang digunakan masih manual. Isu yang muncul tentang keamanan jaringan didasari atas konsep sebuah komputer yang terhubung ke dalam sebuah jaringan yang rentan terhadap serangan, selain itu mayoritas pengguna tidak memiliki latar belakang keamanan untuk mengidentifikasi aktivitas yang berbahaya sehingga seringkali lalai dalam memonitor sejumlah besar lalu lintas dalam sebuah jaringan yang kompleks. Hal ini baru disadari setelah sebuah komputer atau sistem terinfeksi oleh virus atau perangkat lunak yang mencurigakan. Paper ini menjelaskan tentang analisis visualisasi data keamanan jaringan. Metodologi yang digunakan adalah studi kasus, analisis dilakukan pada monitoring jaringan berbasis teks/numerik dan berbasis visual. Hasil analisis menunjukan bahwa hasil pengamatan dengan menggunakan visual dapat memeriksa lalu lintas jaringan dan mendeteksi anomali jauh lebih cepat daripada dengan cara manual (berbasis teks/numerik).
Peningkatan Kinerja Jaringan Komputer dengan Border Gateway Protocol (BGP) dan Dynamic Routing (Studi Kasus PT Estiko Ramanda) Tati Ernawati; Jemi Endrawan
Khazanah Informatika Vol. 4 No. 1 Juni 2018
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v4i1.5656

Abstract

Routing dalam jaringan menjadi elemen utama karena merupakan proses pemilihan salah satu dari beberapa kemungkinan jalur pengiriman paket data dari alamat pengirim ke alamat tujuan. Protokol routing diperlukan untuk membentuk tabel routing berdasarkan informasi routing yang dipertukarkan setiap selang waktu tertentu sehingga pengalamatan pada paket data yang akan dikirim menjadi lebih jelas. Penelitian ini membangun dan mengkaji kinerja jaringan komputer (computer network performance) pada studi kasus di perusahaan yang bergerak dibidang jasa layanan internet, peningkatan kebutuhan jasa layanan internet menuntut adanya pengelolaan jaringan internal di perusahaan dalam upaya peningkatan kinerja jaringan komputer. Pengujian dilakukan pada parameter latency dan traceroute menggunakan metode dynamic routing Border Gateway Protocol  (BGP). Hasil uji menunjukkan sistem jaringan komputer dengan BGP memiliki efisiensi jaringan yang tinggi dengan rata-rata latency 0 ms (82 ms tanpa BGP) dan traceroute (konten lokal) 4 hop (8 hop tanpa BGP), namun traceroute (kontel non lokal) memiliki nilai presentase yang sama dikarenakan seluruh prefix non lokal harus diperoleh dari port backbone (port lama tanpa BGP).
Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System Tati Ernawati; Fikri Faiz Fadhlur Rachmat
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 1 (2021): Februari 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (408.781 KB) | DOI: 10.29207/resti.v5i1.2825

Abstract

Computer network systems have been designing to share resources. Sharing resources process, data security, and confidentiality are main issues in anticipating misuse of the access to information by unauthorized parties. The solution to anticipating these problems is the availability of a security system capable of handling various intruders who threaten the system and protect network resources. This study builds and analyzes the performance of computer network security using cowrie honeypot and snort inline-mode as an Intrusion Prevention System (IPS). The development process goes through the stages of analysis, design, implementation, and monitoring. The content analysis method has been using to explore the problems and requirements of the system built. The security system was build by configuring the IP address and network system devices (server, remote admin, client attacker). The test has been carrying out on 3 test parameters (confidentiality, availability, and integrity), comparison testing method has been using to test the integrity parameters. The test results indicate that the system functionality test for user needs have fulfilled, the results of the confidentiality test (83.3%), availability (93.3%), and the integrity of the inline-mode snort show faster response time (0.069 seconds on average) and more CPU resource usage efficient (0.04% average) than the cowrie honeypot. IPS snort inline-mode overall integrity parameter testing is more recommended for used network security systems than cowrie honeypots.
Media Pembelajaran Geografi Bahasan Siklus Hidrologi Berbasis Animasi Studi Kasus MA. Cahaya Harapan Cisarua Bandung Barat Tati Ernawati; Endah Rachmawati
JUMANJI (Jurnal Masyarakat Informatika Unjani) Vol 3 No 02 (2019): Jurnal Masyarakat Informatika Unjani
Publisher : Jurusan Informatika Universitas Jenderal Achmad Yani

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (517.783 KB) | DOI: 10.26874/jumanji.v3i02.66

Abstract

Media pembelajaran yang tidak dinamis berdampak kepada efektifitas proses pembelajaran dan pengajaran. Kondisi tersebut mempengaruhi tingkat ketercapaian pemahaman siswa terhadap materi yang diberikan. Alat bantu berbasis multimedia pada proses pembelajaran sudah banyak digunakan di sektor pendidikan untuk membatu proses pembelajaran menjadi lebih baik. Tujuan penelitian ini yaitu membuat media pembelajaran alternatif berbasis animasi pada studi kasus di MA. Cahaya Harapan Cisarua Bandung Barat sebagai solusi meningkatkan pemahaman siswa pada mata pelajaran Geografi bahasan siklus hidrologi. Metodologi yang digunakan adalah Multimedia Development Life Cycle (MDLC). Aplikasi dibuat melalui tahapan desain yaitu pembuatan storyboard, implementasi dan pengujian. Hasil pengujian black box testing mengindikasikan aplikasi dapat berjalan sesuai dengan fungsionalitasnya, sementara hasil uji penerimaan pengguna (user acceptance test) terhadap aplikasi secara keselurahan (87%), tingkat pemahaman siswa terhadap materi hidrologi meningkat (36.87%).
Design of Objective IT Strategy, Risk Driver and Risk Control: Design of Objective IT Strategy, Risk Driver and Risk Control Tati Ernawati
Competitive Vol. 10 No. 1 (2015): Jurnal Competitive
Publisher : Politeknik Pos Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information technology (IT) played a central role in the productivity of IT industry intensively. IT provides organizations with the flexibility to redesign processes and create a high-performing organizational design. IT strategy objective used to focus on developing specific business capabilities. Right IT strategic can bring the corporate achieve vision, mission and objectives have been established. Risk must be managed effectively to maximize the effectiveness of its use and that the associated risks of the implemented technology can be mitigated. This paper present a case study in risk management at Food and Beverage Corporate related to achievement of corporate goals . The Research method used is Strategic Objectives at Risk (SOAR) which consists of four stages. The results of this study is proposed strategic Objective IT Map in related Risk driver, risk control include its metric.
Peer to peer (P2P) and cloud computing on infrastructure as a service (IaaS) performance analysis Tati Ernawati; Febi Febiansyah
JURNAL INFOTEL Vol 14 No 3 (2022): August 2022
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v14i3.717

Abstract

The resources of information technology and the availability of services on non-cloud network systems are limited. This constitutes problems for companies, especially in the efficient management of information technology. The high investment in infrastructure procurement is an obstacle in building centralized systems, including the adoption of cloud computing through Infrastructure as a Service (IaaS), as an elective solution. This research aims to analyze the performance of cloud servers on IaaS services using the parameters of cloud service availability, resource utilization, and throughput transfer which were implemented in companies engaged in the toll road concession sector. Furthermore, the results are expected to be a reference in supporting company decisions/policies related to cloud system adoption. The methodology involved the Network Development Life Cycle (NDLC), a system constituted by 6 (six) stages of management, namely user, proxy server, database, web service, monitoring service, and Remote Desktop Protocol (RDP). The results of cloud service availability indicate that the cloud system provides service availability (system interface, broad network access, and resource pooling). Furthermore, cloud systems have a significant performance on resource utilization (CPU) and throughput transfer parameters, while non-cloud systems only excel in response time and resource utilization (Memory) parameters. The overall result analysis based on this research scenario showed that the cloud system provides services according to user needs and has a better speed in data transmission, but has shortcomings in response time.
Design of Objective IT Strategy, Risk Driver and Risk Control: Design of Objective IT Strategy, Risk Driver and Risk Control Tati Ernawati
Competitive Vol. 10 No. 1 (2015): Jurnal Competitive
Publisher : PPM Universitas Logistik dan Bisnis Internasional

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information technology (IT) played a central role in the productivity of IT industry intensively. IT provides organizations with the flexibility to redesign processes and create a high-performing organizational design. IT strategy objective used to focus on developing specific business capabilities. Right IT strategic can bring the corporate achieve vision, mission and objectives have been established. Risk must be managed effectively to maximize the effectiveness of its use and that the associated risks of the implemented technology can be mitigated. This paper present a case study in risk management at Food and Beverage Corporate related to achievement of corporate goals . The Research method used is Strategic Objectives at Risk (SOAR) which consists of four stages. The results of this study is proposed strategic Objective IT Map in related Risk driver, risk control include its metric.