scholarly journals Migrasi dan Optimalisasi Database Sistem Informasi Manajemen Universitas Cokroaminoto Palopo

2016 ◽  
Vol 7 (4) ◽  
Author(s):  
Nahrun Hartono ◽  
Ema Utami ◽  
Armadyah Amborowati

Abstract. Information Management System of Cokroaminoto Palopo University (SIMUNCP) is a web application implemented on a Local Area Network (LAN). SIMUNCP uses MySQL as its database. The data is moved from the old database as a source to postgreeSQL as a target by migration. The migration is done because of lack of features on the old database that uses MySQL could not meet the needs of theorganization. Before the migration, the first process is performed to evaluate the existing errors in the old database and the evaluation results are then used as a reference to design the new database. After the data migration is done the next process is measuring the quality of data on the new database. The quality of the data measured is an aspect of accuracy and nonduplicate aspect. Once that is done the next is to do is optimizing the query, Optimized query is a query that exists in the source code of application SIMUNCP.Keywords: Migration, Database, OptimizationAbstrak. Sistem Informasi Manajemen Univeritas Cokroaminoto Palopo (SIMUNCP) merupakan aplikasi web yang diimplementasikan pada jaringan Local Area Network (LAN). SIMUNCP menggunakan MySQL sebagai basis datanya. Migrasi dilakukan dengan memindahkan data dari basis data lama yang menjadi sumber ke basis data postgreSQL sebagai basis data baru menjadi, hal ini dikarenakan minimnya fitur pada basis data lama yang menggunakan MySQL sehingga tidak mampu memenuhi kebutuhan organisasi. Sebelum dilakukan migrasi, yang dilakukan adalah mengevaluasi kesalahankesalahan yang ada pada basis data lama dan hasil evaluasi tersebut kemudian dijadikan acuan untuk merancang basis data baru. setelah migrasi data dilakukan selanjutnya adalah melakukan pengukuran kualitas data pada basis data baru, kualitas data yang diukur adalah aspek akurasi dan aspek nonduplikat, setelah itu dilakukan optimasi query, dimana query-query yang dioptimasi adalah query-query yang ada pada source code aplikasi SIMUNCP.Kata Kunci: Migrasi, Basis data, Optimalisasi.

Computers ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 39
Author(s):  
Wan Muhd Hazwan Azamuddin ◽  
Rosilah Hassan ◽  
Azana Hafizah Mohd Aman ◽  
Mohammad Kamrul Hasan ◽  
Ahmed Salih Al-Khaleefa

This study presents the proposed testbed implementation for the Advanced Technology Training Center (ADTEC) Batu Pahat, one of Malaysia’s industrial training institutes. The objectives of this study are to discover the issues regarding network congestion, propose a suitable method to overcome such issues, and generate output data for the comparison of the results before and after the proposed implementation. The internet is directly connected to internet service providers (ISPs), which neither impose any rule nor filter the traffic components; all connections comply on the basis of the base effort services provided by the ISP. The congestion problem has been raised several times and the information technology (IT) department has been receiving complaints about poor and sometimes intermittent internet connection. Such issues provide some ideas for a possible solution because the end client is a human resource core business. In addition, budget constraints contribute to this problem. After a comprehensive review of related literature and discussion with experts, the implementation of quality of service through add-on rules, such as traffic policing on network traffic, was proposed. The proposed testbed also classified the traffic. Results show that the proposed testbed is stable. After the implementation of the generated solution, the IT department no longer receives any complaints, and thus fulfills the goal of having zero internet connection issues.


2020 ◽  
Author(s):  
Gustavo Haquin Gerade ◽  
Peter Labak ◽  
Aled Rowlands ◽  
Nenad Steric ◽  
Oleksandr Shabelnyk ◽  
...  

<p>An on-site inspection (OSI) is conducted to clarify whether a nuclear weapon test explosion or any other nuclear explosion has been carried out in violation of the Treaty. The conduct of inspection activities requires an approach that takes into account the operational, technical and time constraints specified in the Treaty. A systematic approach was developed, namely, the information-led search logic for the inspection team (IT) to function effectively. The core of the search logic is inspection data acquired. The realization of the search logic is the Inspection Team Functionality (ITF) which its essential element is having the most updated inspection data readily available to inspectors to facilitate the planning, processing and reporting.</p><p>To facilitate the work of an IT, the Provisional Technical Secretariat launched a project to develop a map centric tool to support the IT. The Geospatial Information Management system for On-site inspections (GIMO), supports decision-making and facilitates the progress of an inspection and not hinder it in anyway. At its core is the facilitation of the ITF concept and chain of custody of samples and electronic media. It is a single tool for planning inspection activities, managing data collection in the field, integration of data generated by the implementation of OSI techniques and reporting. Information security, chain of custody and confidentiality requirements are applied in GIMO following the need-to-know principle. GIMO, 3D geospatially centric software, has no software dependencies outside the internal local area network as required by the Treaty. The modular nature of GIMO means that additional functionality can be embedded as and when needed.</p>


Author(s):  
Afolabi I. T. ◽  
Adeyeye O. M. ◽  
Ayo C.K

Currently, local area network (LAN) is commonplace in the Nigerian tertiary institutions and can be a good platform for distributing and disseminating instructional materials. Thus, this paper proposes to improve the quality of academics through online provision of learning resources based on Free and Open Source Software (FOSS); wired and wireless access to contents; and availability of the system 24/7. The system is based on third party software or FOSS called phpBB and Windows 2003 Server Active Directory Services. Both are installed and configured on an intranet. It has a discussion forum which is accessed through Hypertext Transfer Protocol using a web browser; and directory services for files/folders upload and download based on a set of privilege levels in Discretionary Access Control List (DACL) as a way of improving security. The system leads to the development of a virtual campus in Covenant University. Also, it has helpedimprove the quality of teaching by making lecture notes availably on the intranet, lecturer/studentinteraction, accessibility to teaching materials and reduce student’s idle time. The system helps in no small measure to correct the problems plaguing the educational sector such as examination malpractice, decline standards of education and cultism, as students are gainfully engaged in academic and social activities. The creation of a virtual campus would enhance the level of e-participation, and e-readiness of the graduate for the employment market. In particular, it bridges the divide between the developed and the developing nations.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Irvika Romana ◽  
Gigih Forda Nama ◽  
Hery Dian Septama

Perkembangan Gigabit Ethernet mengalami peningkatan yang cukup pesat. Di Universitas Lampung sendiri telah menggunakan teknologi Gigabit Ethernet sebagai backbone karena mampu mentransmisikan data yang besar serta berkecepatan tinggi. Dengan adanya teknologi Gigabit Ethernet ini, diharapkan peningkatan kualitas intranet yang ada di Universitas Lampung semakin baik kedepannya.Implementasi dari jaringan intranet dengan teknologi Gigabit Ethernet ini perlu diketahui kinerjanya. Pada penelitian ini digunakan metode Design Science Research (DSR) yang memiliki 6 tahapan yaitu identifikasi masalah dan motivasi, menetapkan objek solusi, desain dan pengembangan, demonstrasi, evaluasi, dan pelaporan hasil. Analisa ilmiah ini dilakukan dengan pengukuran terhadap trafik dari jaringan Local Area Netwok (LAN). Parameter yang diukur dan dianalisa adalah bandwidth, delay, jitter, dan packet loss dengan pemberian beban berupa paket data pada TCP dan UDP untuk melihat karakteristik dari jaringan tersebut dengan menggunakan software Jperf dan Wireshark guna melihat baik atau buruknya kualitas dari jaringan intranet Unila. Hasil dari penelitian ini yaitu dapat dikategorikan “Baik” berdasarkan acuan standar ITU-T G.114.Kata kunci: Jperf, Wireshark, Quality of Service, Gigabit Ethernet, DSR, ITU-T G.114.


Author(s):  
Satria Yudha Prayogi ◽  
Sony Bahagia Sinaga

Voice Over Internet Protocol (VoIP) is a voice communication technology (voice) that uses IP which can be done electronically and in realtime. In building VoIP devices used such as IPPBX Server, IPPBX Gateway IP and other supporting devices such as mikrotik. To design VoIP generally implemented using a local area network (LAN) or a wireless local area network (WLAN). In this study, an analysis of the quality of VoIP network communication is to determine the problems caused by communication using VoIP, so that VoIP can be used to maximize the existing internet network. This VoIP network can save costs when communicating such as video communications or video conferencing.


Author(s):  
Kannan Balasubramanian

As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to attack. Today it is the norm to visit Web sites where logins and passwords are required to navigate from one section of the site to another. This is much more so required in a Web application where data is being manipulated between secure internal networks and the Internet. Web applications, no matter what their functions are, should not exchange data over the Internet unless it is encrypted or at least digitally signed. Security should be extended to the private-public network borders to provide the same authentication, access control, and accounting services that local area network (LAN) based applications employ. The most widely used method of Web application security today is Private Key Infrastructure (PKI). Various examples of PKI implementations are examined.


2021 ◽  
Vol 4 (1) ◽  
pp. 65-70
Author(s):  
Marezi Handika ◽  
Herwin Herwin ◽  
Dwi Haryono ◽  
Rometdo Muzawi

SMKN 2 Teluk Kuantan has 4 (four) main lines of internet network. Of the four networks have their own configuration. Static routing applied in SMKN 2 Teluk kuantan for the four modems of the network has their own area, because it is not under one control of the modem to the Router. Static Routing in SMKN 2 Teluk Kuantan is very possible to be damaged or trouble itself on the network of each modem. Static routing problems are so complex in the form of routing information into the routing table that is set manually by the network administrator. Dynamic Routing is very possible to be implemented in SMKN 2 Teluk Kuantan. where dynamic routing has a basic routing algorithm of dynamic routing. Dynamic Routing enters routing information into the routing table through exchanging information with other routers and creates routing tables dynamically, on dynamic routing network administrators will not enter the entry route manually into the routing table. Routing Open Short Path First (OSPF) is a type of routing protocol that builds topology independently by choosing the best path then iji network quality if the best path is in interference and perform Quality of Service (QoS) against realtime data.


Sign in / Sign up

Export Citation Format

Share Document