Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Journal of Informatics and Communication Technology (JICT)

SIMULASI TUNNELING IPV6 OVER IPV4 ade Nurhayati; Septi Ayu Putri
Journal of Informatics and Communication Technology (JICT) Vol 1 No 1 (2019): JICT
Publisher : PPM Institut Teknologi Telkom Telkom Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (629.156 KB) | DOI: 10.52661/j_ict.v1i1.19

Abstract

Pesatnya perkembangan jaringan internet tidak sebanding dengan ketersediaan alamat IPV4 yang terbatas. Kondisi ini mendorong penggunaan IPV6 perlu diterapkan dan perlu diuji integrasinya dengan IPV4. Melalui simulasi Tunneling IPV6 over IPV4 pada Routing Protokol RIPNG (Routing Information Protocol Next Generation) berdasarkan algoritma distance vector dan OSPF (Open Shortest Path First) menggunakan simulator GNS3 dapat diukur performansi integrasinya. Pada penelitian ini pengukuran parameter dapat dikatakan baik dalam hal Delay, Troughput, dan Packet Loss. Delay mendapatkan nilai 79 ms yaitu nilai kategori delay yang sangat baik (excellent) berdasarkan Sumber : ITU-T H.323 nilai delay < 150 ms. Troughput mendapatkan nilai 27,40 Bytes/s maka bisa dikatakan jaringan bekerja dengan baik, karena menurut standar TIPHON, kategori throughput yang baik berkualitas sedang yaitu nilai throughput yakni antara 25-50 Bytes/s.
MONITORING SISTEM KEAMANAN JARINGAN BERBASIS TELEGRAM BOT PADA LOCAL AREA NETWORK Ade Nurhayati
Journal of Informatics and Communication Technology (JICT) Vol 1 No 2 (2019)
Publisher : PPM Institut Teknologi Telkom Telkom Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (500.702 KB) | DOI: 10.52661/j_ict.v1i2.41

Abstract

Menerapkan sistem keamanan dalam jaringan LAN adalah suatu keharusan agar mendapatkan kenyamanan dalam penggunaan, salah satunya adalah keamanan server. Dengan menggunakan snort untuk mendeteksi serangan menuju ICMP, TCP dan UDP secara real time akan dikirim menuju bot telegram yang sudah di integrasikan dengan shell-bot agar bot telegram tidak hanya berguna sebagai notifikasi dari snort tetapi bisa digunakan sebagai pemblok ip saat terdeteksi adanya serangan, maka admin dapat mengetahui apa yang di lakukan attacker di dalam sebuah server. Selain itu menerapkan honeypot dapat berguna untuk mengalihkan attacker menuju server palsu yang sudah di buat menyerupai dengan server asli akan merekam semua tindakan yang di mulai dari cara masuk hingga perubahan yang di lakukan di dalam server palsu tersebut, semua rekaman yang di lakukan honeypot dapat di lihat oleh administrator melalui terminal linux di kippo.log.
Implementasi Virtual Private Network Pada Jaringan Multi Protocol Label Switching Traffic Engineering ade Nurhayati; Risnu Pradana Holiyastuta; Ade Rahmat Iskandar
Journal of Informatics and Communication Technology (JICT) Vol 2 No 1 (2020): Juni
Publisher : PPM Institut Teknologi Telkom Telkom Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (308.61 KB) | DOI: 10.52661/j_ict.v2i1.47

Abstract

Along with the development of telecommunications technology, we need a network that provides traffic services to send data to distant places quickly but does not forget about security, some solutions are the Multi Protocol Label Switching method, Virtual Private Network, and Traffic Engineering. MPLS VPN TE is a combination of several methods that can be used for this problem. In this research, simulation is carried out using GNS3 software and the results of the analysis are carried out using a Wireshark software. This scenario uses the measurement load using FTP and HTTP. The measurement parameters of QoS are transfer time, throughput, delay, and packet loss ratio. The measurement results show that QoS value for transfer time of 25 MB file is 16.94s, and transfer time for HTTP is 4.2 s. The Throughput of 25 MB file is 1.606MB/s, and throughput for HTTP is 5.6 MB/s. The Delay of 25MB file is 1.22 ms, and delay HTTP is 105.37 ms
Tunneling Pipe Mode Pada Jaringan Multi Protocol Label Switching ade Nurhayati
Journal of Informatics and Communication Technology (JICT) Vol 2 No 2 (2020)
Publisher : PPM Institut Teknologi Telkom Telkom Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (566.342 KB) | DOI: 10.52661/j_ict.v2i2.59

Abstract

Along with the developing and the increasing of data communication users, service providers are required to always improve the quality of their services. QoS plays an important role since it is a parameter of the quality level of a service. Pipe Tunneling technique is one of the Qos methods that will guarantee a service will have its own priority level. With the help of the MPLS-VPN protocol, addressing of the IP will be much more flexible. In this thesis the simulation was done using GNS3 software while the results of the analysis were carried out using the WireShark software. There are two scenarios done by the author. For MPLS-VPN the author simulates 2 customers between companies 1 and 2 where both companies have centers in Jakarta and branches in Surabaya. And for Tunneling, both companies want their services to be given the highest priority among other services. From this scenario it can be obtained that with the presence of VRF on the network if there is the same network usage there will be no overlaps of IP. A service will have its own priority level according to the needs and requests. The results of the analysis are more focused on QoS, especially delay and throughput. From the results it shows that MPLS-VPN with Tunneling Pipe Mode integration is able to keep good QoS value. This can be seen from the average of the delay and throughput yield for Tunneling Pipe Mode that is equal to 84,51 ms and 67,858 Bytes / s.