scholarly journals IMPLEMENTASI AUTENTIKASI KEAMANAN DAN MANAJEMEN BANDWIDTH PADA JARINGAN INTERNET DI SDN 001 SEKUPANG

2020 ◽  
Author(s):  
Citra Rahayu ◽  
Tri Hartati

SDN 001 Sekupang is a Public Elementary School located in Tanjung Riau Village, Sekupang District, Batam City. SDN 001 Sekupang has used the internet to carry out work activities with a total bandwidth of 20Mbps. The high access of the user to access the internet, makes the connection unstable, which makes the performance become fast or slow and the number of users use bandwidth simultaneously so that bandwidth pulls occur resulting in a decrease in performance on the internet network. The purpose of this study is to optimize and maximize the available bandwidth so that the available bandwidth can be used evenly and fairly. For this reason, it is necessary to build a method for security authentication and bandwidth management using proxy routerboard by implementing a simple queue method. The simple queue method is one of the methods found on the microtic routerboard which is quite reliable in implementing bandwidth management, which is to divide bandwidth fairly and evenly. For implementers, it is done by configuring the proxy router and conducting direct testing that is assisted by using speedtest.cbn.net.id. By applying security authentication and bandwidth management using microtic routerboard the test results obtained in applying the simple queue method are good enough and each computer gets bandwidth fairly and evenly and makes the performance of each computer stable.

2020 ◽  
Vol 2 (2) ◽  
pp. 70
Author(s):  
Galih Fanani ◽  
Imam Riadi

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.


Author(s):  
MUSMUHARAM . ◽  
Cosmas Eko Suharyanto

SMKN 5 Batam City is an educational institution located in Kavling Bukit Kamboja, Sungai Pelunggut, Kec, Sagulung, Batam City, Riau Islands. The availability of network infrastructure to be institutionalized by education will expedite the educational process including internet network services at SMKN 5 Batam City. The networks used in SMKN 5 Kota Batam are the Local Area Network (LAN) and Wireless Local Area Network (WLAN). Batam City Vocational School 5 has 82 PCs (Personal Computers) connected to the network and Access Points as access to the hotspot network, which uses an indie home ISP with a bandwidth capacity of 100Mbps and 5Mbps using an astinet ISP. Problems that occur on the internet network at SMKN 5 Kota Batam, do not yet have an allocation of bandwidth distribution for network users, causing unstable and uninterrupted network access. Therefore there must be proper bandwidth management controls, implementing bandwidth management and optimizing security authentication. So that the available bandwidth can be used fairly, by applying the queue method. And from the tests carried out, authentication of security and bandwidth management using the tree queue method, fair and even bandwidth can be used as well as the tree queue method proven to be able to use bandwidth both for downloading and downloading. uploaded.


SinkrOn ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 129
Author(s):  
Rudi Arif Candra ◽  
Devi Satria Saputra ◽  
Dirja Nur Ilham ◽  
Herry Setiawan ◽  
Hardisal Hardisal

This study discusses the infusion detection device in a hospital room. This tool is designed to help hospital nurses to cope more quickly to avoid problems due to the infusion. Load cell sensors are used as heavy detectors that send notifications to the nurses through the telegram application that has been installed. The nurse will get a notification message sent to the telegram if the sensor has read the weight. The tool is made using a load cell sensor and NodeMCU Wi-FiESP866 which functions to send notification of the results of sensor data input to the Internet of Things (IOT) platform namely Telegram. Nurses need to be connected to the internet network to get notifications on the telegram. Test results show that the time needed to send and receive notifications on Telegram takes about 2-5 seconds. The message will be sent 3 times, first the infusion WARNING is almost exhausted (alert), second the infusion WARNING is almost exhausted (standby) and the infusion WARNING is almost exhausted (please replace). If the infusion is not replaced by the nurse, it will be warned by Buzzer. However, time can be influenced by the available internet network connectivity. However, time can be affected by the available internet network.


2020 ◽  
Vol 5 (1) ◽  
pp. 178
Author(s):  
Taufik Rahman ◽  
Sumarna Sumarna ◽  
Hafis Nurdin

The internet network enters various sectors and is used in various activities, especially in the automation, industry 4.0 trend. Where almost all applications, ranging from desktops, websites, mobile (android and ios) that are used in various fields of education, transportation, banks, logistics, services, of course use high complexity internet networks that need to be analyzed so that high performance can be obtained. Analyzing the performance of MikroTik on the internet is the aim of this research. Research by configuring includes ip route, firewall filter, NAT, Mangle for packet tagging, Queue (bandwidth management), bridge wireless, DHCP and ip cloud DDNS on MikroTik. The results concluded that moving the configuration center point on the modem (giving the IP address down) to the MikroTik router can be done well, it can also translate company, institutional, school and even parent policies to the home internet when children access the internet, such as when it is allowed to access the internet can be arranged, things that may or may not be arranged in order to educate children to use the internet positively, use MikroTik to analyze internet network performance. As for the further research by looking at problems that exist after MikroTik is configured.


2021 ◽  
Vol 8 (1) ◽  
pp. 75-83
Author(s):  
Minsih Minsih ◽  
Fiki Nur Rahmawati ◽  
Rusnilawati Rusnilawati

This study aims to describe: 1) the process of using e-money tab, 2) the advantages and disadvantages of using the e-money tab, 3) the impacts of using the e-money tab. This study was conducted as a qualitative study facilitating a phenomenological research design. Data was collected through interviews, live observation and analysis of documents. Study subjects included the principal, the IT team and students of 1 Muhammadiyah Elementary School, Ketelan Surakarta (Elementary School of Muhammadiyah 1 Ketelan Surakarta) and was conducted on location. Results of this study showed that: a) the use of e-money tabs as an attendance tracker can only be accessed at school and requires a strong internet network, b) an advantage to the use of e-money tab as an attendance tracker is being able to track attendance of students with ease, allowing teachers to ensure discipline and parents to monitor the arrival and departure time of their children to and from school. On the other hand, a disadvantage to this system is the instability of the internet network especially when multiple students are using the e-money tab at the same time, causing error in the server, c) the e-money tab has impacted the process of attendance tracking, in which it has maintained and improved discipline of students.


2020 ◽  
Vol 12 (2) ◽  
pp. 127
Author(s):  
Tri Liana

AbstractThis study aims to find out:1) Curriculum 2013 implementation, 2) describe the constraints faced in the implementation of the curriculum 2013, 3) the strategy used in the implementation 2013 curriculum in the orchestra education in public elementary school 4 Mempawah. This study is an evaluation research using the CIPP (Contex, Input, Process and Product) developed by Stufflebeam. Data was obtained through curriculum expert validation questionnaires, observation and interviews. Data analysis was carried out qualitative. The results of the study show that: 1) the implementation of the Curriculum 2013 has largely gone smoothly, from 4 schools incorporated only 1 school has not fully planned the implementation of Curriculum 2013, due to the lack of socialization and assistance to teacher and the lack of available facilities at school, 2) the obstacles  faced in the implementation of the  Curriculum 2013 were the lamitations of orchestra teacher and the limited of  infrastructure to support practical activities and the lack of supporting books, library and internet network. 3) the strategy to  overcome the obctacles in the implementation of curriculum 2013 that needs to be prepared furthur is to make good planning based on needs analysis and the existence of good synergies between the central goverment and the provincial as well as local government. There are still many confusions, this is due to the large number of assesment components that must be carried out as demands of the Curriculum 2013. Keywords: Assesment Implementation of the Curriculum 2013, Physical Education


Jurnal Ecogen ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 62
Author(s):  
Ricky Herpana Putra ◽  
Menik Kurnia Siwi

This study aims to determine the implementation of the Android-Based School Examination (USBA) at SMAN 3 Sungai Penuh. This type of research is descriptive with a qualitative approach. Data collection techniques by interview and documentation. The data sources used were primary data and secondary data, which were analyzed by using triangulation techniques. The number of informants in this study were 6 people, namely USBA operators and class XII students of SMAN 3 Sungai Penuh. The results showed that the USBA implementation process at SMAN 3 Sungai Penuh was the same as the conventional exam implementation process, but at USBA students were more independent. The advantages of USBA include exams that can be done anywhere, USBA costs are more efficient than paper exams, test results can be seen after students have finished taking exams, with this USBA minimizing the occurrence of cheating by students. Constraints in implementing USBA are the low capacity of the internet network. Comparing conventional exams with USBA, there are many differences between the two, this can be seen from the equipment used, the form of the questions, the time for taking the questions, the place and the operational costs of the exam.


2021 ◽  
Vol 9 (2) ◽  
pp. 16-25
Author(s):  
Renaldi Adha Nawawi

Bandwidth management is very important in a computer network concept. Bandwidth management functions to regulate network bandwidth so that each network user gets an evenly distributed bandwidth as a whole, even though there are many network users. In this Java shop, the distribution of bandwidth to each client has not been implemented. , there is no bandwidth management on the Java cafe internet network. The results of the internet speed test at the Java cafe use speedtest.net. The result is the distribution of bandwidth between client 1 and client 2 is not evenly distributed. On client 1 get download and upload speeds up to 0.65 and 1.14 Mbps. While on client 2 only get 2.9 and 1.14 Mbps, due to the absence of a bandwidth management system. Hierarchical Token Bucket (HTB) is a method of bandwidth management, HTB can provide more bandwidth to the client in a few seconds the client will get more bandwidth, the research methodology used is (Network Development Life Cycle) with a system development method for the network which includes the stages of Analysis, Design, Simulation, Implementation, Monitoring, and Management. The results show that bandwidth distribution in each client can be done with each client getting a maximum bandwidth of 768Kbps and getting a bandwidth limit-at of 268Kbps so that customers can still get an internet network even though internet traffic is heavy. . and the use of burst limit as a research method can make each client get additional bandwidth when the internet network is empty and can be accepted by clients or visitors to Java stalls.. and the use of burst limit as a research method can make each client get additional bandwidth when the internet network is empty and can accepted by clients or visitors to shop jawa..


2019 ◽  
Vol 8 (2) ◽  
pp. 130-138
Author(s):  
Yogi Isro Mukti

This research aims to implement the existing hotspot network on the campus of the Pagar Alam College of Technology by using a proxy router for the needs of all users, especially students and lecturers to support the academic process. This research is based on the existing internet network at the Pagar Alam College of Technology, which cannot be enjoyed entirely by students and lecturers on campus, because the internet network is only intended for the staff, LPPM room and multimedia lab room and the network lab room is only a few computers which is connected to the internet using a LAN cable. This study uses the method PPDIOO is prepare, plan, design, implement, operate, optimize network has been generated using a proxy router, starting with providing infrastructure, user management, bandwidth management and has been used by the academic community.


Author(s):  
Chrisnaji Banindra Yudha ◽  
Herinto Sidik Iriansyah ◽  
Dyah Anungrat Herzamzam

<em>Gadget has been familiar in Indonesian area. The gadget in this article is a child who was born and grow thrive on the sophistication of technology. A gadget in the intent is handphone that can be conection on the internet network. The user of gadget ranging from the age of two years to the oldman. The focus of the study in article is users gadget 7 on 13 years or the age of elementary school. The problem is a lock of control employing gadget that is not tarred filter carefully. The child interaction with internet will open the actual unorthodox to open at the age. Ironically gadget become a means of some parents to calm her certain conditions, an example when the child crying, parents shopping at shopping canters, when gathered gathering and the offers. So in the study needed to parents in educating children aged elementary school the use of gadget.</em>


Sign in / Sign up

Export Citation Format

Share Document