Articles
Analisis Pengaruh Konfigurasi Network Address Translator (NAT) Statik Berbasis Web Menggunakan Wire Shark
Hero Wintolo;
Salam Aryanto;
Muhamad Hafish
Jurnal Informatika Vol 8, No 1 (2021): April 2021
Publisher : LPPM Universitas Bina Sarana Informatika
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (259.497 KB)
|
DOI: 10.31294/ji.v8i1.10166
Konfigurasi peralatan jaringan computer yang digunakan untuk mengelola sebuah jaringan computer banyak yang menggunakan command line atau berbasis teks meski ada beberapa merk dari peralatan jaringan computer sudah menawarkan perangkat lunak untuk konfigurasi yang berbasis Graphical User Interface(GUI) dengan fungsi yang terbatas. Hal ini menjadi inspirasi untuk membuat perangkat lunak berbasis web untuk fungsi konfigurasi NAT statik dan dinamik. Hasil perancangan perangkat lunak diujikan dalam Local Area Network(LAN) dan jaringan internet untuk layanan server. Perangkat lunak yang dibuat pada peneltian ini terbukti dapat bekerja untuk pembuatan NAT statik dan dinamik melalui perangkat lunak wireshark yang memperlihatkan proses penyalinan alamat IP source menjadi alamat IP router yang ada NAT statik dan dinamik sehingga dapat mengakses web server yang ada. Sebanyak 30 komputer dalam LAN dan computer dari jaringan internet 100% dapat mengkases web server melalui NAT static yang dikonfigurasi menggunakan keyboard dan mouse.
Remote Camera For Android Based Smartphones Installed On The Syma X8HG Drone
Pramudito, Christoporus Galih;
Wintolo, Hero;
Sudaryanto, Sudaryanto
Angkasa: Jurnal Ilmiah Bidang Teknologi Vol 10, No 2 (2018): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (3621.692 KB)
The camera on the smartphone was basically to take pictures or video with equivalent quality digital camera or video recorder. The camera on the smartphone lies in two different locations, first place the rear side and the second being in front. Drone Syma x8hg who used to fly a smartphone for the shooting process is controlled from the laptop software, maximum range 80 meters from the drones by remote control. Software on Android devices and laptops must first diinstalisasi so both devices can be connected to the web server of the provider to process images from a drone Syma x8hg, the two devices must have a network connection provider respectively. Results from testing the smartphone camera carried by a flying drone can be controlled for filming with the distance is affected by the strength of the signal from the service providers internet connection, while the height is limited by the strength of the signal between the drone with remote control.
MEMBANGUNKOMUNIKASI AVITALK BERBASIS ANDROID DENGAN MEMANFAATKAN FREKUENSI 2.4 Ghz PADA JARINGAN LOCAL AREA NETWORK (LAN)
Wintolo, Hero;
Sajati, Haruno;
Sukma, Galih Andita
Compiler Vol 5, No 2 (2016): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (420.779 KB)
|
DOI: 10.28989/compiler.v5i2.163
The importance of communication increases development of information and communication technology in world so rapidly, especially in telecommunications equipment. Mobile phone or smartphone is one type of communication tools that provide communication services to a wide range of features offered but the services offered are not free. AviTalk is applications and services to communicate for free with the use of smartphones based on Android and has a wifi enable this feature. This communication utilizing wifi network at a frequency of 2.4 GHz as to communication network. Test the application is done by trying on some of the features on a smartphone application with different specifications. From the test produced a smartphone that can run the application properly in some smartphones with Android operating system version 4.2 and above, and the smartphone is connected to a wifi network.
Use of Lipat Algorithm on Android to Secure Data Communication in Social Media
Pujiastuti, Asih;
Wintolo, Hero;
Imam, Muhammad
SENATIK STT Adisutjipto Vol 4 (2018): Transformasi Teknologi untuk Mendukung Ketahanan Nasional [ ISBN 978-602-52742-0-6 ]
Publisher : Sekolah Tinggi Teknologi Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (463.228 KB)
|
DOI: 10.28989/senatik.v4i0.138
Cryptography is one of science that learn about securing a message. Message security is done by randomizing the message (encryption) and returned to it’s original form (description). In this study, the designer of the system first and build an application to secure the message by using the Lipat Algorithm method that aims to secure messages consisting of letters, numbers, or symbols. Applications are designed and built running on Mobile Android. The Lipat Algorithm Method applies a fourfold system in the encryption process and the description of the message to be encrypted and in the description will advance 4 (four) characters forward or backward. Based on testing done the application managed to perform the encryption process and description correctly, ranging from short messages to messages as much as 2305 characters.
PEMANFAATAN CLOUD COMPUTING PADA APLIKASI NGEKOST BERBASIS ANDROID
Kusumaningrum, Anggraini;
Wintolo, Hero;
Deny Hp., Fathul Fata
Compiler Vol 5, No 2 (2016): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (189.669 KB)
Ngekost is an android-based boarding search application that utilizes the Internet as a medium of exchange data. The use of mobile android application as a tool to access something that is connected to the Internet to help users find a variety of information. Ngekost applications builtby using cloud computing as a technology that makes the Internet as a central storage server to manage data and information. One media system making cloud computing is to use a Virtual Private Server (VPS) as a virtual server. Applications Ngekost offers boarding house in the city of Yogyakarta, Malang, and Makassar with centralized image data on the storage servers each - each city boarding information and data stored on the database webserver. Services provided on the application can be accessed via the website owners to register them boarding, boarding entering data and images, while searches for boarding accessed via mobile android. The results of testing this application indicates that the application Ngekost by leveraging cloud computing can be usedas an information service for owners and seekers boarding based regional city o f Yogyakarta, Malang, and Makassar.
LAYANAN CLOUD COMPUTING BERBASIS INFRASTRUCTURE AS A SERVICE MENGGUNAKAN ANDROID
Wintolo, Hero;
Dwi Paradita, Lalu Septian
Compiler Vol 4, No 2 (2015): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (168.669 KB)
Cloud computing, one form of information technologies are widely used in the field of computer networks or the Internet. Cloud computing consists of computer hardware, computer networking devices, and computer software, the cloud computing there are three services provided include (SaaS) Software as a Service (PaaS) Platform as a Service, and (IaaS) Infrastructure as a Service. Application cloud computing services in the wake of this system is a service-based data storage infrastructure as a service by using android smartphone as a storage medium, which utilizes FTP Server which is already available on the smartphone. This certainly supports the easy storage of data that utilize various types of internal and external storage on smartphones that serves as a storage server. In addition to the functions of storage available, this service can accommodate streaming function .mp3 file type. Implementation result of the system can be implemented on a local network using a wireless LAN. In addition, the results of user testing using Likert method shows the application can run and function properly
PENERAPAN SISTEM TERDISTRIBUSI PADA TOGETHER IN A SINGLE CONNECTION (TSC) BERBASIS WEB
Sudibya, Bambang;
Wintolo, Hero;
Zuliana, Zuliana
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (142.647 KB)
Distributed system is a computer networking technology which can be hardware or software. In hardware distributed system by a collection of computers that are heterogeneous, being in the software system is distributed in the form of software that connects two applications in the form of client and server side. TSC method is a method that already existed before, which can be used increase the ranking o f a blog. Implementation distributed system for TSC using landing page as the intermediary. Landing page serves as a liaison between web applications or blogs are listed as a member to raise the ranking of a database on the application server side. When someone does click on landing page seoindonesia, will open a blog or other web members. Landing page so it can be used as a way to count the number of visitors to a blog or website, which in turn can increase the number o f page visits and 1 with 1 clickbutton seoindonesia for test in histats.com.
PEMANFAATAN IMAGE TO SPEECH BERBASIS ANDROID UNTUK PENGENALAN WARNA BAGI ANAK BAWAH TIGA TAHUN (BATITA)
Wintolo, Hero;
Widiastuti, Anggit Tri
Angkasa: Jurnal Ilmiah Bidang Teknologi Vol 7, No 2 (2015): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (202.383 KB)
The introduction of color to children under three years of age is done by providing and explaining objects favored by children, such as toys and food, which have certain colors so that children recognize colors at that age. Unlike adults, how to introduce color in children does require a different way, in addition to the objects and food, in this study the introduction of color in children is done by using the software that is installed on the smartphone using the image to speech. This method is expected to be more easily carried out and the results are expected to be maximum because of equipment smartphones today the price is very affordable and are often used by children ages two until three years old to play games.
PENERAPAN ALGORITMA SAPA PADA JARINGAN AD-HOC UNTUK MENGIDENTIFIKASI KOMPUTER BERBASIS MAC ADDRESS
Indrianingsih, Yuliani;
Wintolo, Hero;
Widyarto, Chris Tri
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (739.772 KB)
Wi-Fi waves are commonly used as an intermediary in the communication relationships in the wireless network. However, the use o f Wi-Fi waves can be used in addition to getting the relationship in the network, the user is also able to detect and identify other devices by using Wi-Fi waves. Ad-hoc network is a network that can be built independently by the computer with the Microsoft Windows operating system, to enable ad-hoc device has to have an identity that is SSID, the SSID is then activate the device can be detected by other devices. Activation is done ad-hoc by the netsh command is a shell command in the Windows 7 operating system. An ID must be unique for each device as there is no dual identity, to maximize the identification process. Utilizing MAC address as an identity is used, allowing the device to be uniquely identified. In addition to the MAC address is added to the device profile in the identity o f the device for easier identification. Sapa application users can identify the device is detected, and recognize it as a co-owned devices. Scheme which is the concept o f the algorithm Sapa. Sapa application allows device activation or notebook PC with the Windows 7 operating system to be detected and detected by other devices with the Windows 7 operating system and applications are also active Sapa. Communication is established indirect communication that occurs in a single direction. Detection range can be done up to 77 meters distance.
ANALISA PERBANDINGAN WAKTU DAN KECEPATAN TRANSFER PADA MULTI PROTOCOL LABEL SWITCHING (MPLS) DENGAN VIRTUAL PRIVATE NETWORK (VPN) UNTUK PERPINDAHAN DOKUMEN PADA JARINGAN KOMPUTER
Saleh, Ibrahim;
Wintolo, Hero;
Nugraheny, Dwi
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (189.009 KB)
MPLS (Multi Protocol Label Switching) technology has been developed and mostly used by the service provider on their main network. Data packets which forwarded from one router to another router can also use VPN (Virtual Private Network) technology. VPNs were developed in the field of computer networks now have many variants, such as MPLS VPN and VPN which connects between computers or a LAN through a public network is the internet. The purpose of this final task is build a lab scale VPN network with MPLS technology use Mikrotik router RB 750GL and create a VPN connection to the STTA campus network passing the public internet. Then do a comparative analysis of the time required and the speed of transfer on both the network. The results of a comparative analysis between MPLS and VPN with the same file capacity, it appears that the MPLS network is faster in time speed and transfer speed