scholarly journals Perbandingan proxy pada linux dan windows untuk mempercepat browsing website

2017 ◽  
Vol 8 (1) ◽  
pp. 50-57
Author(s):  
Dafwen Toresa

Abstrak- Pada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan, maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa. Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client). Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute. Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute Abstract- At this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy server on different operating system that is Linux Operating System with Squid tools and Windows Operating System with Winroute tool. This study was conducted to determine the comparison of browsing speed of the user's computer (client). The browser used on the user's computer is Mozilla Firefox. This study uses two client computers with each test 5 times accessing web browsing / destination testing via proxy server. From the results of tests conducted, it can be concluded that the application of proxy server in linux operating system with squid tools faster browsing from client using the same web browser and client computer different from the proxy server windows operating system with winroute tools. Keywords: Proxy Server, Linux, Windows, Squid, Winroute

Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


2015 ◽  
Vol 09 (04) ◽  
pp. 483-502
Author(s):  
Ke Hao ◽  
Phillip C.-Y. Sheu ◽  
Hiroshi Yamaguchi ◽  
Jeffery J. P. Tsai

One may expect the Internet to evolve from being information centric to knowledge centric. This paper introduces the concept of a Knowledge Society Operating System (KSOS) that allows users to form knowledge societies in which members can search, create, manipulate and connect geographically distributed knowledge resources (including data, documents, tools, people, devices, etc.) based on semantics (“meaning”, “intention”) in order to solve problems of mutual interest. Built on top of the current Internet infrastructure, a KSOS can take advantage of existing resources to enable the use of applications or services through a web browser. This paper discusses some crucial aspects of a KSOS.


Author(s):  
Phillip K.C. Tse

Most clients are placed behind the proxy servers on the Internet. Proxy servers have the disk cache space, network bandwidth, and availability to cache part of the objects for clients. In addition, the number of proxy servers can be increased or decreased dynamically according to the anticipated server workload, making them good candidates to alleviate the bottleneck problem. We have described in the last two chapters how the caching methods provide better performance for continuous request streams in individual proxy servers. In this chapter, we show how the proxy servers may work together to improve the overall performance in delivering objects. At present, large multimedia objects are not cached or only partially cached in current proxy servers mainly for two reasons. First, the owner of the multimedia objects needs to ensure security and control of access of the objects before they are willing to let any proxy servers cache their objects. Thus, any new methods need to allow the content owner have complete control over the objects’ security. Second, the owner of the proxy server wishes to have full autonomy control over its own cache content so that the proxy server may maximize the cache efficiency for its own clients.


2016 ◽  
Vol 4 (2) ◽  
pp. 242
Author(s):  
Fatah Mumtaz Al'Ala ◽  
Rinta Kridalukmana ◽  
Eko Didik Widianto

Numbers of internet users are increasing incredibly fast. Ideally, this increasing numbers of users are also supported by capacity uplift, in this case an increase in bandwidth to maintain the standard services that received by the users. However, increasing the bandwidth not always becomes the first option since it is quite expensive. Implementing proxy server as content/cache engine is the other option available. It will cache the content that user requested and keep it for a while for servicing the other users that will request the same content in the future. WCCP protocol is used to redirect user’s traffic to the proxy server. The standard proxy server configurations are using single router with one or more proxy servers. This thesis is aims to design and implement proxy server system with multi routers configuration. Multi routers configuration is used as a failover mechanism to provide network high availability. It will use HSRP protocol to provide the high availability services. Tests that conducted after implementation shows the increase in transaction and successful transaction by 296% and 284% also a decrease in response time as well as failed transaction by 18% and 99% consecutively. Failover test shows the percentage of packet loss amounted to 31,3% and 26,3% for clients in VLAN 10 and VLAN 20 consecutively. The average time required for clients to reconnect to the internet after router failure is 7 seconds for clients in VLAN 10 and 6 seconds for client in VLAN 20.


2013 ◽  
Vol 4 (2) ◽  
pp. 74-78
Author(s):  
Gina Akmalia ◽  
Elvyna Tunggawan ◽  
Kevin Sungiardi ◽  
Alfian Lazuardi

Proxy server is the intermediary between client and the Internet. The usage of proxy server is one of many means to avoid excessive access to the Internet. Proxy server’s cache will save every web page which has been accessed, so clients can save their bandwidth when they access same web pages repeatedly. Distributed proxy is a collection of connected proxy servers which has shared cache. This research will prove that distributed proxy server can shorten data access time and minimize bandwidth. On this research, we use Squid Proxy Server on Windows 7 as the main tool. Index Terms - distributed proxy, shared cache, Squid


2021 ◽  
Vol 18 (1) ◽  
pp. 283-291
Author(s):  
Sarjimin ◽  
Herman ◽  
Anton Yudhana

Penggunaan System Operasi Linux yang didistribusikan secara open source menjadikannya operating system yang dapat didistribusikan secara masif oleh banyak perusahaan. PC/Notebook maupun perangkat pintar yang berbasiskan Linux semakin diminati oleh user karena dalam proses distribusinya tidak dipungut biaya apapun. Memberikan layanan browsing internet kepada para user secara privat dan tidak meninggalkan jejak digital merupakan salah satu upaya yang dilakukan oleh web browser sebagai upaya invovasi web browser mendapatkan pengguna layanan sebanyak-banyaknya. Metode investigasi forensic web browser private mode menjadi hal yang perlu guna menjadi acuan dalam melakukan forensic terhadap kasus/kejadian kejahatan yang melibatkan layanan browsing secara privat. Ada banyak tools yang dapat dimanfaatkan untuk melakukan live forensics dan analisis data. Penelitian ini berhasil mengungkap bahwa layanan browsing secara privat yang disediakan oleh Mozilla Firefox nyata-nyata tidak privat secara menyeluruh. Artefak digital masih dapat ditemukan dalam RAM dan dianalisa dengan menggunakan berbagai macam tools untuk forensic, tools Autopsy berhasil mendapatkan data log browser sebesar 83%. Hasil artefak investigasi tersebut dapat menjadi acuan permulaan para investigator dalam penegakan hukum untuk mencari tersangka lain dan mendalami sebuah kasus yang melibatkan banyak pihak.


Author(s):  
Andreas Sebayang ◽  
Indrastanti Ratna Widiasari

Technology and internet networks are two things that are always related, because in today's era the internet has become a much-needed medium for learning, communicating, exchanging data, and even playing. With the activity of using the internet network, a problem will arise, namely network security. Network security is a very important aspect as a defense in a network, to minimize the risk of data theft and unwanted access in an internet network. The purpose of this study is to implement the control and security of internet use in an agency with minimal costs. namely using the Linux operating system Ubuntu Server 18.04, Proxy Server, and Snort. The result of the system that has been created has a function to perform caching so that it can save bandwidth and can function as filtering content to minimize unwanted things on the network. In addition, the system created is very helpful for network admins to monitor the network in real-time, even can also enforce rules to protect the network.


2019 ◽  
Vol 9 (2) ◽  
pp. 103-105
Author(s):  
S. Saravana Raj ◽  
K. Vijayakumar

The present study deals with Utilization of ICT among the faculty members of Siddha Colleges and various level of operating system with the information accessed by the faculty through the internet. The survey was conducted with the help of the questionnaire and personal interview. The responses received from the available faculty are presented in tables and data is analyzed by using simple statistical method. The findings reveals that the access of electronic information is an important component of research activities for faculty members like E-Journals, E-books, E-databases are most preferred electronic information resources.


Leonardo ◽  
1999 ◽  
Vol 32 (5) ◽  
pp. 353-358 ◽  
Author(s):  
Noah Wardrip-Fruin

We look to media as memory, and a place to memorialize, when we have lost. Hypermedia pioneers such as Ted Nelson and Vannevar Bush envisioned the ultimate media within the ultimate archive—with each element in continual flux, and with constant new addition. Dynamism without loss. Instead we have the Web, where “Not Found” is a daily message. Projects such as the Internet Archive and Afterlife dream of fixing this uncomfortable impermanence. Marketeers promise that agents (indentured information servants that may be the humans of About.com or the software of “Ask Jeeves”) will make the Web comfortable through filtering—hiding the impermanence and overwhelming profluence that the Web's dynamism produces. The Impermanence Agent—a programmatic, esthetic, and critical project created by the author, Brion Moss, a.c. chapman, and Duane Whitehurst— operates differently. It begins as a storytelling agent, telling stories of impermanence, stories of preservation, memorial stories. It monitors each user's Web browsing, and starts customizing its storytelling by weaving in images and texts that the user has pulled from the Web. In time, the original stories are lost. New stories, collaboratively created, have taken their place.


2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Syarief Gerald Prasetya

State Non-taxable Revenue (PNBP) from the energy and mineral sources (ESDM) sectors, particularly at Oil and earth gas(Migas) sector, coal and mineral sector, are very significant revenue of the state which is State Non-taxable Revenue described on the National budget and revenue(APBN). Actually there are still a lot of BUMN, BUMD, private companies which have not paid yet their PNBP to the Ministry of ESDM.. This research aims to recognize empirically the system of PNBP management within the Ministry of ESDM. This research has applied an analytical descriptive method which is a method to provide an actual condition regarding the credit management. The State revenue refers to PNBP credit has still been beyond the expectation due to a slow process of PNBP credit administration as well as the organization management which has not been running well. An effort to speed up the process should have to be applied refers to the efficiency of the related sources consumed such as time, cost and manpower. An effort to develop the effectiveness of State credit administration should have to be applied by improving the organization performance to maximize the result of the State credit management.


Sign in / Sign up

Export Citation Format

Share Document