Dany Primanita Kartikasari
Fakultas Ilmu Komputer, Universitas Brawijaya

Published : 46 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Implementasi Arsitektur Web Server Cluster Menggunakan Single Board Computer untuk Menunjang Kebutuhan High Availability System Roisul Setiawan; Dany Primanita Kartikasari; Bayu Rahayudi
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 8, No 2: April 2021
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2021824512

Abstract

Untuk mewujudkan ketahanan pangan, diperlukan mekanisme pengumpulan data secara real-time dari produsen  bahan pangan, pendisitribusi bahan pangan sampai pengolah bahan pangan. Namun tidak semua organisasi yang berkecimpung dalam distribusi pangan memiliki infrastruktur sistem informasi yang cukup baik. Untuk mengatasi kendala infrastruktur, penelitian ini mengusulkan untuk membangun arsitektur web server cluster yang dapat menunjang kebutuhan high availability system menggunakan single board computer.  Komponen arsitektur terdiri dari dua tier yaitu: frontend dan backend. Untuk menjamin kehandalan sistem, arsitektur  yang diusulkan didukung dengan komponen load balancing, mekanisme failover dan replikasi database. Sistem telah diuji berasarkan kebutuhan fungsional dan kebutuhan non-fungsional yang sudah didefinisikan sesuai kebutuhan organisasi. Dari hasil pengujian, tingkat availabilitas yang dihasilkan sebesar 95.83%. AbstractTo achieve food security, a real-time data collection mechanism is needed from food producers, food distribution to food processing. However, not all organizations involved in food distribution have adequate information system infrastructure. To overcome infrastructure constraints, this study proposes to build a web server cluster architecture that can support the needs of a high availability system using a single board computer. The architectural component consists of two tiers, namely: frontend and backend. To ensure system reliability, the proposed architecture is supported by load balancing components, failover mechanisms, and database replication. The system has been tested based on functional requirements and non-functional requirements that have been defined according to organizational requirements. From the test results, the resulting availability level is 95.83%.
Implementasi Constrained Application Protocol (CoAP) pada Sistem Pengamatan Kelembaban Tanah Yosef Febri Wiryawan; Dany Primanita Kartikasari; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1104.568 KB)

Abstract

Recently, technology has been developed to facilitate human life in every aspects including agriculture. Implementation of technology in agriculture is still left behind for example in terms of observation soil moisture. Based on concept of Wireless Sensor Network (WSN) we can make a suitable network architecture to solve the problem. Wireless Sensor Network (WSN) is one of the emerging technologies which combine sensors and tiny embedded devices over a wireless communication medium. The aim of this study is how to make a reliable communication for the system. To accomplish our objectives, we implemented a lighweight protocol as a web transfer protocol named Constrained Application Protocol (CoAP) for the system. To collect the soil moisture data we integrated Microcontroller Wemos D1 and sensor YL-69 to perform as a sensor node, it sends sensing data to the server with bluetooth module HC-05. Then servers and clients will exchange data wirelessly using the CoAP protocol. To see the performance of the CoAP protocol, we tested the data exchanging that occurs between server and client in several scenarios. The test result revealed there is a significant increase of delay in payload size more than 64 bytes because of process blockwise mechanism in CoAP protocol. In addition, distance can also increase the delay in data transmission process.
Analisis Kinerja Protokol Routing pada Arsitektur Delay Tolerant Network Terhadap Beberapa Pola Pergerakan Hafidz Rizal; Widhi Yahya; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1060.835 KB)

Abstract

Delay Tolerant Network (DTN) is a network does not matter for delay, disruption, and disconnection from the internet. The continuous movement for send a massege will produce movement patterns, like patterns of random, scheduled, and patterned movements. This research to know performance of routing protocol of Prophet, Maxprop, Epidemic, and Spray And Wait with addition of node and speed on random, scheduled and patterned movement. The One is used for simulation and OpenJUMP for the make a map. The results form the addition of node and speed is probability delivery and overhead rasio has increased and average latency is decreased. The protocol routing maxprop has better performance in the pattern of random movement and patterned movement, because on the addition of nodes and speed produce the value on delivery probability is 63% and 55% in random movement, 62% and 59% patterned movement, average latency is 33% and 31% in random movement, 32% and 32% patterned movement, and overhead ratio is 83% and 78% in random movement, 83% and 88% patterned movement. Then the pattern of scheduled movements protocol routing spray and wait has better performance, because on the addition of nodes and speed produce the value on average latency is 37% and 44%, overhead ratio is 4% and 8%, and delivery probability is 41% and 40%.
Implementasi K-Shortest Path Routing pada Jaringan Software Defined Network Romy Dwi Andika Manullang; Widhi Yahya; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (785.001 KB)

Abstract

Software Defined Network (SDN) is a network modeling separating control plane and data plane. Network routing is part of SDN that give interest for the research. The most commonly used routing algorithm today is the single path routing algorithm. This algorithm uses only one path as the data transmission medium. This will reduced network performance known as network congestion. In this study we implemented Yen K-Shortest Path as routing algorithm. These algorithm will search for as many K lines as the data transmission medium. The Yen K-shortest path algorithm will minimize network congestion. These algorithms has been implemented using Mininet emulator and Ryu controller in two topology. The tests performed to measure the performance of the algorithm include convergence time, throughput, packet loss. The data obtained in the test using the Yen K-Shortest Path algorithm compared to data obtained using Dijkstra algorithm with the same test method. And there is a test to see the success of the algorithm for using more than one path on multipath testing. In the convergence time test, the Yen K-Shortest Path algorithm gets an average of 0.01962 seconds for the first topology, and 0.02409 seconds for the second topology. Based on the results of throughput testing, the Yen K-Shortest Path algorithm outperformed Dijkstra's algorithm with the highest throughput increase reaching 176.01% larger. For packet loss test results, Yen K-Shortest Path is also superior because it has fewer packet loss than Dijkstra algorithm.
Implementasi Link Fast-Failover Pada Multipath Routing Jaringan Software-Defined Network Muhammad Aji Wibowo; Widhi Yahya; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (827.96 KB)

Abstract

Software-defined network is a concept of computer network approach where the control plane is separated by data plane. The communication between the data plane controller uses the OpenFlow protocol. In an SDN architecture it often happens to have interference such as failure link. in the latest openflow protocol there is a group type that overcomes the interruption of the link is using a fast-failover mechanism. Tests conducted to measure the performance of the system include testing functionality, response time and packet loss. The results of the test obtained from this study are able to search the path at the time before the link down and after the link down. At the time of link 1 in down in topology has a response time with an average of 0.38-0.681 ms and in link 2 has an average of 0.272 - 0.549 ms. When the link is down, the lost packet until it finds the new path can be known the value of packet loss. packet loss obtained from the simulation has an average of 0.423% -0.636%.
Analisis Mekanisme Keamanan Antara TLS/SSL Dan Crypto Pada Komunikasi IoT Middleware Dengan Subscriber Berbasis Protokol HTTP Deny Hari Prasetya Dewa; Eko Sakti Pramukantoro; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (697.874 KB)

Abstract

There is a security hole in message delivery on a middleware where messages are still in plain text, causing data confidentiality to be insecure. Eavesdropping activities will be very easy to do if a security mechanism is not implemented immediately. Based on the problem, implemented end-to-end security mechanism using TLS / SSL and Crypto. The use of security mechanisms not only secures the network, but also affects the performance of the system. The process of encryption and decryption slows down middleware performance. This study focuses on knowing how the impact of TLS / SSL and Crypto security mechanisms, especially AES-256 on data security and middleware performance. Before the security mechanism is implemented, the data contained on the network is very readable. After both security mechanisms are implemented, the data cannot be known again because the contents have been encrypted. TLS / SSL provides stronger security by using certificate exchanges as an authentication system. Both methods installed are capable of securing the system but both affect the performance of middleware. Both security mechanisms have no significant effect on CPU and memory usage. AES-256 produces better values ​​on packet loss parameters, with a value of 1%. While TLS / SSL is superior in parameter delay and jitter, with value 0.089008423 sec and 0.003208877 sec.
Implementasi Load Balancing untuk Kontroler Software Defined Network Adi Iman Utama; Widhi Yahya; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (496.464 KB)

Abstract

The development of increasingly complex needs of traditional networks will affect the high cost of investment and hardware maintenance so that required solutions to these developments by using Software Defined Network (SDN). SDN is a concept of separation between control plane and data plane on network devices such as routers and switches, whereas in traditional networks the control plane and data plane are combined into one. Using a single controller on the SDN concept obtained a latency value with an average of 1000 to 1900 responses / second and throughput with an average of 50 to 300 flow / second, the value decreased performance when the number of switches connected in the network environment increased. In this research apply load balancing to do the load sharing on some controller that connected so that performance of each controller can run with maximal. The controller used in this research is POX while to implement load balancing controller will be used HAproxy on server computer. The test results show that as the increasing number of controllers with load balancing will provide better latency and throughput results from the use of 3 controllers obtained the latency value with an average of 2000 to 3300 responses / second and throughput with an average of 70 to 4300 flow / second, but as the number of controllers increases load of server load balancing will increase seen from CPU and Memory Usage.
Implementasi Serangan Black Hole pada Mobile Ad-Hoc Network dengan Pergerakan Dinamis Terstruktur menggunakan Protokol Dynamic Source Routing Tasrahmiati Istiqomah; Reza Andria Siregar; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1199.433 KB)

Abstract

MANET is one of the wireless technologies that consists of several mobile nodes that are structuredwithout a fixed infrastructure. In the absence of a fixed infrastructure, it poses a challenge in terms ofsecurity. One of the MANET attacks that are often encountered is black hole attacks. A black hole attackis a data retrieval attack by sending fake reply messages to the data sending node that declares itselfas the shortest and fastest node to get to the destination node. Where before reaching the destinationnode, the data packet has been dropped. Black hole attacks have two types of attacks, including; anattack which is only done by one attacker node and a collaborative black hole attack performed bymore than one attacking node. In this study the authors use the model of manhattan mobility gridmovement and routing protocol. One of the routing protocols found in MANET is the DSR routingprotocol. the simulation of this test is done using NS-3 simulator with test scenario based on number ofnodes, number of black hole nodes and the area of simulation area. The test was conducted todetermine the effect of black hole attacks of data transmission with packet delivery ratio testingparameters and total packet loss. From the simulation, the test result shows that black hole attackworks quite significantly with total packet loss 89.6552% and the best packet delivery ratio is 53.3333%
Rancang Bangun Pengamatan pH Air Menggunakan Protokol MQTT Cahyo Karya Basuki; Dany Primanita Kartikasari; Achmad Basuki
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 1 (2019): Januari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (529.971 KB)

Abstract

Water pH is the most important aspect in the field of fisheries, especially in fish cultivation in ponds. PH monitoring problems, currently very much talked about one of them is weather changes that make the management sometimes forget or are lazy to check. So that the role of technology is needed that can help overcome the problem, to convey water pH data to managers remotely. IoT or the Internet of Things is a technology concept whose application can be used to help overcome these problems, where the system works is to connect physical objects with internet communication. IoT requires a protocol to run data transmission that functions as data transport from sensors to users on a network. The protocol used is MQTT (Message Queuing Telemetry Transport) where the protocol is expected to work in low bandwidth and unrealiable networks. The mechanism applied to the system used is publish-subscribe. With a sensor node on Arduino microcontroller as a publisher. Then the Raspberry Pi microcomputer is a server that functions as a broker, time control middleware and data storage. Subscriber as the data requester adopts from java language as a simple interface to the user so that it is easy to read. From the implementation that has been made, it is obtained the results of system testing that matches expectations and obtains protocol kinerja protokolnce which refers to the average latency and delay values ​​below 1 ms, which are 0.31 ms and 0.71 ms with a test time of 3x24 hours.
Implementasi Perangkat Mobile Publisher Subscriber Sebagai Perantara Pengiriman Data Sensor Dari Lapangan Ke Pusat Data Sukma Alamsyah Budianto; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (521.984 KB)

Abstract

Sensor devices implemented in the field facing a problem when sending data on unstable network conditions to the data center. To solve these problems, we develop an application based on the Android operating system implementing publish/ subscribe communication as an intermediary for sending sensor data in the field to the data center using the MQTT protocol. To prove the application can operate as an intermediary for sending sensor data in the field to the data center, three tests are carried out. There are functional testing, scenario testing and performance testing. In functional tests, five functional requirements designed can be fulfilled by the application as an intermediary for sending sensor data to the data center. In scenario tests, from the three test scenarios performed the results of the application can be carried out without any application errors. In performance testing by calculation application performances and get the results of Subscriber Throughput is equal to 161.55 message/s, Publihser Throughput is equal to 2.13 message/s, the latency message average Subscriber apps are 1488.28 ms and the publisher message latency average app is 5208.86 ms.