scholarly journals PERANCANGAN VIRTUAL PRIVATE NETWORK DENGAN SERVER LINUX PADA PT. DHARMA GUNA SAKTI

Author(s):  
Siswa Trihadi ◽  
Frenky Budianto ◽  
Wirriyanto Arifin

Purpose of this research is to analyze and design a network between head and branch office, andcompany mobile user, which can be used to increase performance and effectiveness of company in doingtheir business process. There were 3 main methods used in this research, which were: library study, analysis,and design method. Library study method was done by searching theoretical sources, knowledge, and otherinformation from books, articles in library, and internet pages. Analysis method was done by doing anobservation on company network, and an interview to acquire description of current business process andidentify problems which can be solved by using a network technology. Meanwhile, the design method wasdone by making a topology network diagram, and determining elements needed to design a VPN technology,then suggesting a configuration system, and testing to know whether the suggested system could run well ornot. The result is that network between the head and branch office, and the mobile user can be connectedsuccessfully using a VPN technology. In conclusion, with the connected network between the head andbranch office can create a centralization of company database, and a suggested VPN network has run well byencapsulating data packages had been sent.Keywords: network, Virtual Private Network (VPN), library study, analysis, design

2007 ◽  
Vol 1 (2) ◽  
pp. 180
Author(s):  
Indrajani Indrajani

Article analysis business process of a running report delivery and designes an automatied report delivery tothe ABC company partner by noticing the safety of data transfered. The used methods are literature, interview,survey, analysis, and design method. The result is indicates that there is email automation by automail application.The conclusion is the automail analysis and design was cover verification process, text file encoding, and reportdelivery by encryption-description process as form of data safety.Keywords: system analysis, design analysis, automail application


Author(s):  
Albert Verasius Dian Sano

The objective of this research is to develop a web-based-online-stock-simulation application applying Virtual Private Network (VPN) technology. The web-based application is prefered for user’s convenience and comfort since it does not require any software to be installed on the client side and is also accessable anywhere and anytime with internet connection availability. The application is developed by means of analysis and design towards the technology needed to establish the connectivity between servers through internet as well as database analysis and design. The data are real time derived from the Indonesia Stock Exchange (IDX) and forwarded through an official data vendor PT XYZ. Data from the IDX will be captured by a middleware application at PT XYZ and forwarded to www.kontan.co.id. This application has been tested and succesfully run by around 700 users. This tool is expected to provide a kind of education and motivation to beginner-level investors who want to be engaged with the stock-trading activities. 


Author(s):  
Herru Darmadi

This study discusses specifically the encryption mechanism that maintains the integrity of the game data on online games. The purpose of this study is to implement symmetric key encryption and checksum for score calculation. There are two methods conducted in this study: analysis and design. The analysis method isperformed in two ways: analysis of existing systems and analysis of literature study. System design method used is prototyping. The results obtained are implemented on online game competition ‘Expedisi Indosat’ through Facebook from 3 – 30 July 2011. The implementation of symmetric key encryption mechanism and the checksum is useful to maintain data integrity on games especially the results score when the game is running and when there is data transmission from the client to the server.


Author(s):  
Chimezie F. Ugwu ◽  
Henry O. Osuagwu ◽  
Donatus I. Bayem

This research developed an Intranet-Based Wiki with Instant Messaging Protocol (IBWIMP) for the Staff of the Department of Computer Science, University of Nigeria, Nsukka to enable them to collaborate on tasks; like writing of documents like, memo, project guidelines, proposal/grants, and circulars with online security consideration. The essence of this work is to improve on the contributions staff make during work, in carrying out tasks with their colleagues irrespective of the person’s location at that point in time. The existing system on ground would always require the presence of the staff within the department before they can carry out the tasks meant for them or respond to the available mails within their mail boxes located within the general office of the department. In regard to such situation, there is always delay in the processing of such mails or documents that could require urgent attention of the supposed staff therefore could cause serious damages. This research established a better internet connection for the security of the system and the documents therein by the use of virtual private server (VPS) hosting on virtual private network (VPN). This system allows the collaboration between the staff of the department and external persons, or partners classified as external staff user on documents like circulars that normally come from outside the department. This system automatically sends emails to the supposed users whenever the admin posts a document via the Short Message Transfer Protocol (SMTP). The system is accessed online by the users from any location once there is accessible internet connection and users can collaborate on the development of any posted document at the same time. This application was designed using Object Oriented Analysis and Design Methodology (OOADM) and implemented using Hypertext Markup Language (HTML), JavaScript, Cascading Style Sheet (CSS), CkEditor, Hypertext Pre-Processor (PHP) and MySQL database management system.


The Winners ◽  
2008 ◽  
Vol 9 (1) ◽  
pp. 88
Author(s):  
Henny Hendarti ◽  
Anton Anton ◽  
Didi Didi ◽  
Mochtar Cakra

Article purpose was to make computerized system useable for running the company operational and the activity always needs information. The data collecting method were done by literature study, field study, and documentation study. Analysis and design method consisted of four phase, which were investigation system, analysis system, design system, and implementation system. The result from observation was the company needs transaction recording system that computerized so every selling or buying transaction of foreign currency can directly update the inventory. The conclusion is that the up-to-date selling and inventory information can help manager in making decision.


Author(s):  
I Wayan Eka Putra Darmawan

VoIP (Voice over Internet) dikenal juga dengan sebutan IP (Internet Protocol) Telephony saat ini semakin banyak digunakan karena memiliki beberapa keunggulan, salah satu diantaranya yaitu tarif yang jauh lebih murah daripada tarif telepon tradisional sehinggapengguna telepon dapat memilih layanan tersebut sesuai dengan kebutuhannya. VoIP dapat mereduksi biaya percakapan sampai 70%. Selain memiliki beberapa keunggulan di atas,VoIP juga memiliki kelemahan yang sangat vital yaitu dari segi keamanan transfer suarakarena berbasis IP, sehingga siapapun bisa melakukan penyadapan dan perekaman terhadap data VoIP. Ganguan yang terjadi pada sistem VoIP ada berbagai macam diantaranya, transferdata yang lewat pada suatu jaringan seperti misalnya dapat disalahgunakan (abuse), dapatdibajak isi data tersebut (sniffing), dan tidak dapat mengakses server dikarenakan server yang kelebihan muatan (Denial of Services).Ada beberapa cara untuk mengamankan komunikasi data VoIP, antara lain, dengan mengamankan jalur yang digunakan pengguna untuk melakukan komunikasi VoIP denganmenggunakan metode VPN (Virtual Private Network) dan juga dapat dilakukan suatu metode kriptografi pada aplikasi VoIP tersebut sehingga data yang dikirimkan dapat dilindungidengan baik. VPN adalah teknik pengaman jaringan yang bekerja dengan cara membuat suatu tunnel sehingga jaringan yang dipercaya dapat menghubungkan jaringan yang ada diluar melalui internet. Titik akhir dari VPN adalah tersambungnya Virtual Channels (VCs)dengan cara pemisahan. Kenyataannya koneksi sebuah end-to-end VPN tergantung dari sebuah nilai dari hubungan daripada titik-titiknya. VPN mempunyai dua metode dalampengamanan yakni IPSec dan Crypto IP Encapsulation (CIPE). Selain itu dapat dipergunakan teknik Kriptografi (cryptography) yang merupakan ilmu dan seni penyimpanan pesan, data,atau informasi secara aman.Sistem VoIP menggunakan VPN ini diharapkan dapat memberikan keamanan transfer data pada jaringan internet maupun intranet.


2019 ◽  
Vol 7 (2) ◽  
pp. 129
Author(s):  
Firmansyah Firmansyah ◽  
Mochamad Wahyudi ◽  
Rachmat Adi Purnama

2019 ◽  
Author(s):  
Amarudin ◽  
Sampurna Dadi Riskiono

Akhir-akhir ini sudah mulai banyak perusahaan yang memanfaatkan protokol Virtual Private Network (VPN) sebagai media akses/komunikasi antar jaringan interlokal. VPN adalah sebuah protokol keamanan jaringan yang dapat digunakan sebagai salah satu cara untuk meningkatkan keamanan jaringan dari sisi transmisi data. Dengan pemanfaatan VPN, koneksi antar jaringan dapat terbentuk secara virtual walaupun tidak terbentuk secara fisik. Selain itu, dengan memanfaatkan protokol VPN, user (client) dapat mengkases Server secara private melalui jaringan public. Dengan demikian komunikasi antara Client dan Server terjaga dari Sniffing (penyadapan) dari pihak yang tidak bertanggung jawab. Akan tetap tingkat keamanan yang dihasilkan dari penerapan VPN ini perlu dilakukan pengkajian yang lebih dalam. Sehingga tingkat keamanannya dapat diketahui apakah sudah termasuk dalam kategori aman ataukah masih ada peluang bug yang membahayakan dari penetrasi. Dalam penelitian ini dilakukan pengujian Scanning dan Sniffing pada penerapan VPN menggunakan toos hacking yaitu Nmap dan Wireshark. Sedangkan pengujian performansi service pada VPN Server, dilakukan pengujian Denial of Service (DoS) menggunakan tools hacking yaitu LOIC. Adapun objek penelitian ini adalah perangkat Mikrotik RouterOS yang digunakan pada Universitas Teknokrat Indonesia. Hasil penelitian yang didapatkan bahwa komunikasi data antar jaringan (antara VPN Server dan VPN Client) dapat terenkripsi dengan baik. Akan tetapi dari segi konektifitas antar jaringan sangat dipengaruhi oleh performansi bandwidth yang digunakan oleh sistem jaringan tersebut. Selain itu berdasarkan hasil pengujian performansi service pada VPN Server didapatkan hasil bahwa service pada VPN Server dapat dimatikan pada request (ping) sebesar 1.899.276 request. Hal ini dipengaruhi oleh spesifikasi perangkat Mikrotik RouterOS yang digunakan. Adapun untuk penelitian selanjutnya perlu dilakukan pengujian performansi konektifitas menggunakan bandwith yang lebih besar dan untuk menguji performansi service VPN Server menggunakan spesifikasi perangkat Mikrotik yang lebih baik.


2014 ◽  
Vol 5 (1) ◽  
pp. 12-19
Author(s):  
Yohannes Kurniawan ◽  
Janastasha Christie Parapaga

The research goal is to identify and analyze the need of accounting information system related to the revenue cycle at PT XYZ. This paper designing the useful of accounting information systems to support the current business processes, especially on the revenue cycle process. The design method is an Object Oriented Analysis and Design (OOAD) which refers to the modeling and design requirements discipline. And the result achieved by analysis and design of accounting information systems can support current activities of the revenue cycle, especially for the documentation and store of transaction data, and generate reports in accordance with company requirements. Conclusions derived from the analysis and design is the implementation of a webbased application that can help PT XYZ to do the work in different places, such as marketing office, head office and especially at the exhibition. Index Terms - Accounting Information System, revenue cycle, OOAD 


Sign in / Sign up

Export Citation Format

Share Document