Claim Missing Document
Check
Articles

Analisis Performansi Algoritma Penjadwalan Log Rule dan Frame Level Schedule Skenario Multicell Pada Layer Mac LTE ., Ridwan; Irawati, Indrarini Dyah; Negara, Ridha Muldina
JURNAL NASIONAL TEKNIK ELEKTRO Vol 5, No 1: Maret 2016
Publisher : Jurusan Teknik Elektro Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jnte.v5n1.205.2016

Abstract

Mobile telecommunications technology gradually evolved to support better services such as voice, data, and video to users of telecommunications services. LTE (Long Term Evolution) is a network based on Internet Protocol (IP) standardized by 3rd Generation Partnership Project (3GPP). To support it, LTE requires a mechanism that can support. One of them by applying methods of scheduling packets in each service. Scheduling is a different treatment to packets that come in accordance with the priorities of the scheduling algorithm. In this research, to analyze the performance of LTE with paramater delay,  packet loss ratio,  throughput  and fairness index uses a scheduling algorithms Frame Level Schedule (FLS) and Log Rule on LTE-Simulator with scenarios using Voip traffic, Video and Best Effort (BE). The results is scheduling algorithms FLS is better than log rule in term of throughput values, while of scheduling algorithms log rule is better than FLS in terms of delay based on the number and speed of the users. This indicates that both scheduling algorithms suitable for use in LTE networks within conditions of traffic real time services, but not for non real time services such as BE.Keywords LTE, Scheduling, QoS, Triple Play Services, Log Rule dan FLS. Abstrak — Teknologi telekomunikasi selular berkembang guna mendukung layanan triple play yaitu voice, data, dan video yang lebih baik kepada pengguna jasa telekomunikasi. LTE (Long Term Evolution) adalah suatu jaringan berbasis IP (Internet Protokol) yang distandarisasi oleh 3GPP (3rd Generation Partnership Project). Untuk mendukung hal itu, LTE memerlukan suatu mekanisme yang dapat mendukungnya. Salah satunya dengan menerapkan metode penjadwalan paket di tiap layanan. Penjadwalan adalah perlakuan terhadap paket yang datang sesuai dengan prioritas dari masing-masing algoritma penjadwalan. Pada penelitian ini, menganalisis performansi LTE dengan parameter Delay, Packet loss, Throughput dan Fairness Index menggunakan algoritma penjadwalan FLS (Frame Level Schedule)  dan Log Rule pada LTE-Simulator dengan skenario menggunakan trafik VoIP, Video dan BE (Best Effort). Hasil yang didapatkan adalah penjadwalan algoritma FLS lebih baik dibandingkan Log Rule dalam hal throughput sedangkan penjadwalan algoritma Log Rule lebih baik dibandingkan FLS dalam hal delay berdasarkan perubahan jumlah dan kecepatan user di setiap layanan real time. Hal ini menandakan kedua algoritma ini sangat cocok digunakan untuk jaringan LTE dengan kondisi trafik layanan real time, tetapi tidak untuk layanan seperti non real time yakni BE.Kata Kunci : LTE, Scheduling, QoS, layanan triple play, Log Rule dan FLS.
Network Security Analysis in Vanet Against Black Hole and Jellyfish Attack with Intrusion Detection System Algorithm Mustikawati, Elsa; Perdana, Doan; Negara, Ridha Muldina
CommIT (Communication and Information Technology) Journal Vol 11, No 2 (2017): CommIT Vol. 11 No. 2 Tahun 2017
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i2.3886

Abstract

VANET is the key to the Intelligent Transportation Systems (ITS), where vehicles can communicate with others to exchange information in real time. VANET is an ad-hoc that has no fixed infrastructure and rapidly changing network topology. As the result, the network is insecure and vulnerable to various attacks both from within and outside the network. This research analyzes AODV routing protocol comparing the conditions without the attacks and with the attacks with the of black hole and jellyfish using the algorithm of Intrusion Detection System with the number of nodes changing from 10 to 100 nodes at the change speeds of 70, 80, 90, 100, 110, and 120 km/h. This research is simulated using Network Simulator 2 to model the network and ONESimulator to model node mobility. The analyzed QoS parameters are packet delivery ratio (PDR), throughput, and end-to-end delay. The results of the simulation show that changing the number of nodes and node velocity affects the performance in the network. On the number of nodes scenario with attacks, the average value of PDR decreases by 48.03%, throughput decreases by 50.23%, and delay, for black hole, decreases by 80.18% but increases by 47.87% for jellyfish. Whereas in the node velocity scenario, the average values of PDR, throughput, and delay decrease by 58.52%, 60.34%, 13.81% for blackhole attack, respectively. However, the delay increases by 123.91% for jellyfish attack.
Performance Analysis on IEEE 802.11ah Standard with Enhanced Distributed Channel Access Mechanism Oktaviana, Ana; Perdana, Doan; Negara, Ridha Muldina
CommIT (Communication and Information Technology) Journal Vol 12, No 1 (2018): CommIT Vol. 12 No. 1 Tahun 2018
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i1.3908

Abstract

IEEE 802.11ah is a new task group on the IEEE 802.11 standard designed to work on the 900 MHz. It is with a range of communication coverage up to 1kilometer, lower energy consumption, and up to 8191 stations. There are two types of STAs in 802.11ah: sensor type to support sensor service and non-sensor type for offload service. In this research, it only focuses on non-sensor STA. For non-sensor STA, maximizing throughput is more important than power consumption. This research aims to see the performance of IEEE 802.1 1ah with Enhanced Distributed Channel Access (EDCA). To achieve that purpose, a mechanism is needed to provide guarantees various services required by theSTA. EDCA is an access mechanism used to set the Quality of Service (QoS) for the IEEE 802.11 standard through modifications in MAC layer. In this research,it focuses on one of the EDCA parameters, Arbitration Inter-Frame Space (AIFS). In addition, this research also focuses on the 802.11ah feature is Restricted Access Window (RAW) by changing the number of the RAW groups. From the results of the research, it is found that the improvement scheme with Arbitration Inter-Frame Space Number (AIFSN) value AC BK = 2, AC BE = 1, AC VI = 1, AC VO = 1 has better performance compared to the default scheme with AIFSN value AC BK = 7, AC BE = 3, AC VI = 2, AC VO = 2) with an average throughput of 1.504598 Mbps, average overall delay of 0.066242 second and average PDR of 62%. In addition, changes in the number of RAW groups and RAW slots affect network performance. This feature can improve the value of throughput, average delay, and Packet Delivery Ratio. The goals of this research is to know the effect of AIFSN value changes on AIFSN parameters, variation of RAW group and RAW slot number to throughput,average delay and packet delivery ratio.
Analisis Kinerja GPSR dan AODV pada VANET dengan Skema Pengimbangan Beban Trafik PRASETIA, RENDI DIAN; PERDANA, DOAN; NEGARA, RIDHA MULDINA
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 6, No 2 (2018): ELKOMIKA
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v6i2.207

Abstract

ABSTRAKSalah satu permasalahan di kota-kota besar adalah kemacetan lalu lintas yang disebabkan karena tidak mencukupinya ruas jalan, volume kendaraan yang begitu besar, persebaran kendaraan yang tidak merata dan lain-lain. Salah satu solusinya adalah para pengendara dapat menggunakan aplikasi peta digital pada smartphone-nya. Oleh karena itu perlu dilakukan pengimbangan beban trafik kendaraan. Pada penelitian ini akan dibahas mengenai kinerja VANET yang menggunakan protokol routing GPSR dan AODV dengan skema pengimbangan beban trafik kendaraan dengan pengaruh kepadatan node. Perancangan sistem simulasi terbagi menjadi dua subsistem yaitu subsistem mobilitas dan jaringan. Kemudian dilakukan pengimbangan beban trafik kendaraan, dan kinerja VANET akan diamati. Performansi dievaluasi dengan average end to end delay, throughput, dan packet delivery ratio. Nilai rata-rata throughput, PDR, delay untuk GPSR adalah 142.21 Kbps, 87.47 %, dan 82.83 ms. Sedangkan AODV adalah 119.81 Kbps, 86.67 %, dan 103.21 ms. Dari hasil penelitian nilai QoS performansi dari routing protocol GPSR lebih baik dari pada AODV pada VANET.Kata kunci: Vanet, Pengimbangan Beban, GPSR, AODV.ABSTRACTOne of the problems in big cities is congestion. The congestion is caused byinsufficient road segment, large volume of vehicles, unbalanced spread ofvehicles and others. One solution is that riders can use digital map applications on their smartphones. Therefore it is necessary to balancing the traffic load of vehicles. In this research will be discussed about VANET performance using GPSR and AODV routing protocol with vehicle traffic load balancing scheme with node density influence. The design of the simulation system is divided into two subsystems namely mobility and network subsystem. Then balancing the vehicle traffic load, and VANET performance will be observed. Performance is evaluated with the average end to end delay, throughput, and packet delivery ratio. The mean value of throughput, PDR, delay for GPSR respectively 142.21 Kbps, 87.47%, and 82.83 ms. While AODV is 119.81 Kbps, 86.67%, and 103.21 ms. From the simulation results can be concluded that the performance of GPSR is better than AODV on VANET. Keywords: Vanet, Load Balancing, GPSR, AODV.
Analisis Performansi Layanan FTP danVideo Streaming berbasis Network Function Virtualization menggunakan Docker Containers DJOMI, MANZILA IZNIARDI; MUNADI, RENDY; NEGARA, RIDHA MULDINA
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 6, No 2 (2018): ELKOMIKA
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v6i2.180

Abstract

ABSTRAKInfrastruktur jaringan seperti router, secara tradisional menggunakan hardware yang bersifat proprietary. Teknologi virtualisasi pada fungsi jaringan atau NFV (Network Function Virtualization) membuat layanan ini dapat diimplementasikan sebagai aplikasi perangkat lunak yang dapat dijalankan di lingkungan virtual atau Virtualized Network Functions (VNFs). Selain menggunakan hypervisor (hardware-level virtualization), teknologi virtualisasi memiliki alternatif pengimplementasian dengan menggunakan teknologi containers (Operating system -level virtualization), salah satunya menggunakan Docker. Penelitian ini mengimplementasikan layanan FTP dan video streaming pada jaringan NFV di Docker Containers. Tanpa backgound traffic, layanan menunjukkan performansi QoS yang memenuhi standarisasi ITU-T G.1010 dengan delay FTP 0,12 ms dan delay video streaming 6,21 ms serta nilai packet loss kedua layanan sebesar 0%. Penggunaan CPU pada Docker ketika layanan dijalankan dibawah 1 %. Kata kunci: Virtualisasi, Containers, Docker, Network Function Virtualization, QoSABSTRACTNetwork infrastructure such as routers, traditionally using proprietary hardware. Virtualization technology on network function or NFV (Network Function Virtualization) makes this service can be implemented as a software application that can run in virtual environment or Virtualized Network Functions (VNFs). In addition to using hypervisor (hardware-level virtualization), virtualization technology has an alternative implementation using containers technology (Operating system-level virtualization), one of them using Docker. This research implements FTP and video streaming services on NFV networks in Docker Containers. Without background traffic, the service demonstrates QoS performance that meets the ITU-T G.1010 standardization with 0.12 ms FTP delay and 6.21 ms video streaming delay and with packet loss value of both services at 0%. CPU usage on Docker when service runs below 1%.Keywords: Virtualization, Containers, Docker, Network Function Virtualization, QoS
Implementation of Role-Based Access Control on OAuth 2.0 as Authentication and Authorization Triartono, Zehan; Negara, Ridha Muldina; Sussi, Sussi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1970

Abstract

As today’s technology transition from monolithic towards microservices architecture, the authentication and authorization system also becomes a new concern because of the difference between monolithic and microservices pattern. Monolithic mostly uses role-based access control while microservices uses scope with OAuth 2.0. With this in mind, there is a need for a model that can integrate OAuth 2.0 with role-based access control. With rolebased access control implemented on OAuth 2.0, we expect a simpler authorization process and a more secure authentication and authorization system for microservices backend architecture. This paper proposes a model to implement role-based access control on OAuth 2.0 using Laravel framework, we also test the performance of the system following by response time, data transferred and throughput. From the performance test, this approach has a good performance and can handle certain requests with simulated users even with limited resources.
Performance Analysis of CSI:T Routing in a Delay Tolerant Networks Kusuma Putri, Hardika; Vidya Yovita, Leanna; Muldina Negara, Ridha
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (327.176 KB) | DOI: 10.11591/eecsi.v4.1090

Abstract

Delay Tolerant Network (DTN) is a network that allows nodes to move dynamically and doesn’t always provide for end-to-end connection. The dynamically of nodes make the movement of the nodes becomes important. The movement model of nodes will record their behavior and this could be utilized to develop a new routing protocol in DTN. One of the DTN routing protocol that utilize it is CSI: T routing. CSI: T routing viewed a node based on their behavioral profile which is represent the mobility preference. Our study is measure the performance of CSI: T in terms of delivery probability, overhead ratio, and average latency by changing the buffer capacity, packet lifetime, and number of nodes. We used Opportunistic Network Environment (ONE) Simulator for the simulate the real-life scenario of a college-routines.
Advanced detection Denial of Service attack in the Internet of Things network based on MQTT protocol using fuzzy logic Budiana, Mochamad Soebagja; Negara, Ridha Muldina; Irawan, Arif Indra; Larasati, Harashta Tatimma
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2340

Abstract

Message Queuing Telemetry Transport (MQTT) is one of the popular protocols used on the Internet of Things (IoT) networks because of its lightweight nature. With the increasing number of devices connected to the internet, the number of cybercrimes on IoT networks will increase. One of the most popular attacks is the Denial of Service (DoS) attack. Standard security on MQTT uses SSL/TLS, but SSL/TLS is computationally wasteful for low-powered devices. The use of fuzzy logic algorithms with the Intrusion Detection System (IDS) scheme is suitable for detecting DoS because of its simple nature. This paper uses a fuzzy logic algorithm embedded in a node to detect DoS in the MQTT protocol with feature selection nodes. This paper's contribution is that the nodes feature selection used will monitor SUBSCRIBE and SUBACK traffic and provide this information to fuzzy input nodes to detect DoS attacks. Fuzzy performance evaluation is measured against changes in the number of nodes and attack intervals. The results obtained are that the more the number of nodes and the higher the traffic intensity, the fuzzy performance will decrease, and vice versa. However, the number of nodes and traffic intensity will affect fuzzy performance.
Analisis Performansi Routing Protocol OLSR Dan AOMDV Pada Vehicular Ad Hoc Network (VANET) Anisia, Rianda; Munadi, Rendy; Negara, Ridha Muldina
JURNAL NASIONAL TEKNIK ELEKTRO Vol 5, No 1: Maret 2016
Publisher : Jurusan Teknik Elektro Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (522.577 KB) | DOI: 10.25077/jnte.v5n1.204.2016

Abstract

Vehicular Ad-Hoc Network (VANET) is a development of the Mobile Ad-Hoc Network (MANET), which makes the vehicle as its nodes. VANET technology is expected to improve the security of drivers while driving on a highway between the others, with the map location, traffic information, warning if there will be a collision, and internet access in the vehicle. However, VANET has the characteristics of a network rapidly changing due to the rapid movement of nodes that need to have a routing protocol that is considered suitable and efficient so that data transmission can be optimally lasts. This research will be simulated and analyzed the comparative performance of Optimized Link State Routing Protocol (OLSR) and Ad Hoc On-demand Multipath Distance Vector (AOMDV) using urban conditions (urban). The environment will be tested in speed changes and the effect of the number of nodes nodes. This simulation was done using NS-equipped with SUMO 0.12.3 2:34. as mobility MOVE as a script generator and generator Performance was measured using parameters such as Average throughput comparison, Packet Delivery Ratio, Average End-to-end delay, Normalized Routing Load, and Routing Overhead. Results of analysis in environmental VANET, routing protocols AOMDV superior routing protocol than OLSR. Because almost all parameters tested in scenarios of changes in the number of nodes and node speed AOMDV have better performance so AOMDV more efficient use on urban environmental conditions.Keywords : VANET, NS-2, OLSR, AOMDV, SUMO, MOVEAbstrak— Vehicular Ad-Hoc Network (VANET) merupakan pengembangan dari Mobile Ad-Hoc Network (MANET) yang menjadikan kendaraan sebagai node nya. Teknologi VANET diharapkan dapat meningkatkan keamanan pengemudi saat berkendara di jalan raya antara lain dengan adanya map location, informasi lalu lintas, peringatan jika akan terjadi tabrakan, dan akses internet pada kendaraan. Namun, VANET memiliki karakteristik jaringan yang cepat berubah karena pergerakan node yang cepat sehingga perlu dipilih protokol routing yang dinilai cocok dan efisien sehingga pengiriman data dapat berlangsug secara maksimal. Pada penelitian ini akan disimulasikan serta dianalisis perbandingan kinerja Optimized Link State Routing Protocol (OLSR) dan Ad Hoc On demand Multipath Distance Vector (AOMDV) menggunakan kondisi urban (perkotaan). Di lingkungan tersebut akan diuji perubahan kecepatan node dan pengaruh jumlah node. Simulasi ini dilakukan dengan menggunakan NS-2.34 dilengkapi dengan SUMO 0.12.3. sebagai mobility generator dan MOVE sebagai script generator Performansi diukur menggunakan parameter perbandingan berupa Average throughput, Packet Delivery Ratio, Average End-to-end delay, Normalized Routing Load, dan Routing Overhead. Hasil analisis di lingkungan VANET, protokol routing AOMDV lebih unggul dibandingkan protokol routing OLSR. Karena hampir pada semua parameter yang diujikan pada skenario perubahan jumlah node maupun kecepatan node AOMDV memiliki performansi yang lebih baik sehingga AOMDV lebih efisien digunakan pada kondisi lingkungan perkotaan.Kata Kunci : VANET, NS-2, OLSR, AOMDV, SUMO,MOVE
Performance Analysis of Data Traffic Offload Scheme on Long Term Evolution and IEEE 802.11AH Made Adi Paramartha Putra; Doan Perdana; Ridha Muldina Negara
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.6033

Abstract

One of new mobile technology is being developed by 3GPP is Long-Term Evolution (LTE). LTE usually used by user because provide high data rate. Many traffic sending over LTE, makes several users didn’t get good Quality of Service (QoS). Traffic diversion is needed to increasing QoS value. It can be done with offloading data method from LTE to Wi-Fi network. This paper using 802.11ah standard to evaluate Wi-Fi network. IEEE 802.11ah have 1000 meters coverage area and efficiency energy mechanism, which is proposed for M2M in 5G techonology. Some research has proven that traffic diversion with offloading can increasing network performance. The contribution of this paper is to evaluate the impact of traffic offload between LTE and IEEE 802.11ah standard. This paper propose two scenarios using increment number of user and increment mobility speed of user to evaluate throughput and delay value before and after the offload process. The simulation will simulate using Network Simulator-3. We can conclude that network performance after offloading is better for every scenario. For increment number of user scenario, throughput value increasing 29.08%, and delay decreasing 8.12%. Scenario with increment mobility speed of user obtain throughput value increasing 37,57%, and delay value decreasing 27.228%.
Co-Authors ., Ridwan Abu Riza Sudiyatmoko, Abu Riza Adinda Riztia Putri Ammatia Risty, Ammatia Ana Oktaviana Ana Oktaviana Ana Oktaviana, Ana Andi Achmad Akbar Wisani Anisia, Rianda Arif Faturrachman Arif Indra Irawan Arif Nur Hidayat Arif Nur Hidayat, Arif Nur Arifiana Satya Nastiti Asep Mulyana Audy Septarindra Budiana, Mochamad Soebagja Danastri Ratna Nursanti Dewi Danu Dwi Sanjoyo Dewanto, Ramadhika Dimitri Mahayana DJOMI, MANZILA IZNIARDI Doan Perdana Edgar Giovanni Ariestawan Elsa Mustikawati Faishal Yusuf Baqir Fakhri Rahmatullah Favian Dewanta Febri Surya Hadi Goklas Giovanni Sitompul Haidlir Achmad Naqvi Halimah Tussyadiah Hardika Kusuma Putri I Gede Agus Surya Negara I Putu Yasa Icha Nurlaela Khoerotunisa Indrarini Dyah Irawati Iqbal Firda Rusdiansyah Kharisma Bani Adam Kusuma Putri, Hardika Larasati, Harashta Tatimma Leanna Vidya Yovita Lenna Vidya Yovita Manzila Izniardi Djomi MANZILA IZNIARDI DJOMI Mirdan Syahid Mulya Sudrajat Mohammad Rifki Baihaqi Muhammad Al Makky Muhammad Dimas Arfianto, Muhammad Dimas Muhammad Fihri Muhammad Irfan Denatama, Muhammad Irfan Mustikawati, Elsa Nachwan Mufti Adriansyah Nastiti, Arifiana Satya Negara, I Gede Agus Surya Nugraha, Andre Rizki Dewo Nyoman Bogi Aditya Karna Oki Marzuqi Pande Putu Kika Adi Saputra Parman Sukarno PRASETIA, RENDI DIAN Puji Dwika Pradana Putra, Made Adi Paramartha Putri Monika Rahmat Yasirandi Ramadhika Dewanto Ramadhika Dewanto Ratna Mayasari Rein Rachman Putra RENDI DIAN PRASETIA Rendy Munad Rendy Munadi Revan Faredha Aswariza Revan Faredha Aswariza, Revan Faredha Reza Lutfi Ananda Rianda Anisia Rianda Anisia Ridwan . Rifqi Fadillah Rahmadayansya Rio Guntur Utomo Rizka Darmawan Dwi Putra ROHMAT TULLOH Ruli Erinton Salwa Aulia Farida Y Sayid Huseini Elfarizi Setia Juli Irzal Ismail Sofia Naning Hertiana Sri Astuti Sri Rezeki Sussi Tadila Fadil Toni Kusnandar Tri Reza Gading Tri Reza Gading Triani Wulandari Triani Wulandari Triartono, Zehan Uke Kurniawan Usman Veby Riza Fransiska Wildan Maulana Xavier Samuel MFP Yeni Sanovia Yuanita Indah Putri Yudha Widiyanto Zehan Triartono Zufar Dhiyaulhaq