2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)
This paper presents the development of Enterprise Security Framework (ESF) for an Indonesian gove... more This paper presents the development of Enterprise Security Framework (ESF) for an Indonesian government institution called SKK Migas (Special Task Force for Upstream Oil and Gas Business Activities). The framework developed based on two security standard namely ISO 27000 and SABSA. The development is started by evaluating available information security standard and best practice used in enterprise scale. The next step is analyzing existing security policy and implementation regarding the Information Security Management System (ISMS) in SKK Migas and then perform gap analysis. The main step is the synthesis of security framework which intended to improve information security management in SKK Migas. The resulted security framework covers 14 security domains which will be used to control information security management within the institution.
ZigBee standard can be used in wireless sensor networks (WSN) with a mesh topology. WSN which for... more ZigBee standard can be used in wireless sensor networks (WSN) with a mesh topology. WSN which formed WPAN that uses ZigBee standard has the capability to thousands of WSN devices can be combined in a single WPAN. With that ability need to do testing WPAN performance parameters to get the number of WSN devices for the best performance in mesh topology. Using simulation program, the research measure throughput, traffic (sent, receive and drop), delay and hop number parameters. Testing about the influence of the number of WSN devices is done by running a simulation of the 20 kind WPAN where every WPAN has one WSN gateway and the number of WSN devices ranging from 5 and increasingly by 5 to reach the 100 WSN devices in a single WPAN. The results showed that WPAN performance with ZigBee standard in mesh topology has the best conditions when the maximum number WSN devices achieve 20 WSN devices.
Makalah ini merupakan hasil analisis unjukkerja jaringan internet di Jurusan Teknik Elektro Polit... more Makalah ini merupakan hasil analisis unjukkerja jaringan internet di Jurusan Teknik Elektro Politeknik Negeri Bandung dengan desain jaringan Multi Protocol Label Switching (MPLS) sebagai backbone. Input penelitian adalah throughput dan waktu delay antara end to end system di dalam jaringan yang dimaksud. Analisis dilakukan dengan membandingkan antara jaringan MPLS dan non MPLS terhadap input-input tersebut untuk protokol User Datagram Protocol (UDP) dan Transmission Control Protocol (TCP). Hasil penelitian menunjukan bahwa waktu delay pengiriman paket dalam jaringan MPLS relatif kecil. Sehingga jaringan MPLS ini mampu memberikan unjuk-kerja dengan tingkat layanan yang lebih optimal dan cocok untuk diterapkan bagi layanan paket data yang real time.
The high bit rate 802.11n consumes more power compared to other 802.11 modes during data transmis... more The high bit rate 802.11n consumes more power compared to other 802.11 modes during data transmission, reception, and idle (not transmitting or receiving high volume data) [1][2] and may lead to a shorter battery life in mobile devices [3]. This study investigates the transmit, receive, and idle energy consumption of 802.11 modes then forms a dynamic 802.11 mode scheme that uses different energy saving modes for different STA (Wireless Station) operations. The dynamic scheme energy consumption was compared against static schemes using a test bed that realizes seamless data communication during mode transitions. The results show that 802.11n is the most energy efficient mode to use in transmissions and receptions whereas 802.11g is the most energy efficient to use while idle. Therefore, the 802.11g-802.11n-802.11g dynamic mode scheme was formed and it was proven to be the most energy efficient scheme in ’30-second idle – 100 MB transmit – idle’ experiments whereas the static 802.11g ...
2017 9th International Conference on Information Technology and Electrical Engineering (ICITEE)
Vowel recognition is the most important part of the speech recognition process. Most spoken speec... more Vowel recognition is the most important part of the speech recognition process. Most spoken speeches must contain vowels to be sounded. It needs a method that can separate a vowel with another. The methods of the feature extraction on time domain, frequency, cepstrum, and fourier are several basic methods that can be used. This paper compares features of the strengths of the feature of zero crossing rate, energy, spectral centroid, spectral spread, spectral entropy, harmonic ratio, fundamental frequency, cepstrum, and fourier to separate and recognize vowels of a, i, u, e, and o in Indonesian dialect/language. The results show that the spectral spread feature that is one of the features in the frequency domain has the most accurate ability to recognize vowels tested compared to other features.
Protocol IEEE 802.15.4/ZigBee is a standard for low power personal network. This paper discusses ... more Protocol IEEE 802.15.4/ZigBee is a standard for low power personal network. This paper discusses about router, end device and coordinator using ZigBee protocol in term of distance and time to join. Testing carried out by pairing and On/Off method that constitute communication model from router or end device to coordinator. The result showed that with pairing methods could far distance until outside building with further distance about 65 meters, while the distance using On/Off method can reach few room in indoor area. Longest time to join need about 1 minute 15 seconds. Compare with pairing method that always connected, On/Off method need more time to connect in ZigBee Network. Protokol IEEE 802.15.4 / ZigBee merupakan standar untuk jaringan terbatas dengan konsumsi daya rendah. Paper ini membahas perangkat router, end device dan koordinator dengan protokol ZigBee terhadap jarak dan waktu gabung. Pengujian dilakukan dengan metode pairing dan On/Off, yang merupakan model komunikasi d...
Saat ini smartphone sudah menjadi kebutuhan primer bagi semua kalangan masyarakat kelas atas maup... more Saat ini smartphone sudah menjadi kebutuhan primer bagi semua kalangan masyarakat kelas atas maupun kalangan bawah. Seiring kebutuhan tersebut banyak vendor-vendor smartphone yang menawarkan harga, fitur, operating sistem dan teknologi yang berbeda-beda. Akan tetapi, keinginan dan kebutuhan masyarakat yang semakin meningkat sering tidak sesuai dengan smartphone yang diinginkan dan yang dibutuhkan. Hal tersebut menyebabkan pengguna smartphone tidak dapat menentukan pilihan yang tepat sesuai dengan kebutuhannya karena seringnya pemilihan smartphone didasarkan pada gengsi dan perilaku konsumtif masyarakat. Penelitian ini dilakukan untuk memberikan saran kepada masyarakat agar dapat memilih smartphone yang sesuai dengan karakteristik masing-masing pengguna (kebutuhan pengguna). Karakteristik pengguna didapatkan dari pengolahan 16 pertanyaan yang diajukan oleh sistem. Metode yang digunakan dalam mengolah 16 pertanyaan tersebut adalah forward chaining. Forward chaining digunakan karena da...
In the industrial world, Modbus / TCP protocol is one of the communication protocols that are wid... more In the industrial world, Modbus / TCP protocol is one of the communication protocols that are widely used in control systems to control machines connected in a network through Programmable Logic Controller (PLC). Modbus / TCP is also used as a communication protocol on the Supervisory Control And Data Acquisition (SCADA) system. Problems that exist in the industry, that special devices for Human Machine Interfaces (HMI) are relatively very expensive, for industries that are small scale, but on the contrary the price of Smartphone devices is increasingly affordable. The purpose of this study is to empower smartphones as IIoT system input devices that can transmit gyroscope, acceleration, and proximity sensor data to PLC devices using the Modbus / TCP protocol. More specifically this research is to develop an Android-based interface application program (API) that is capable of sending sensor data to PLC devices using the Modbus TCP protocol in real time. The results showed that the in...
PT. Bank BPR Jatim memiliki 74 kantor se-Jawa Timur dan harus bersaing dengan 331 BPR di Jawa Tim... more PT. Bank BPR Jatim memiliki 74 kantor se-Jawa Timur dan harus bersaing dengan 331 BPR di Jawa Timur. Sudah ada SI/TI yang digunakan tetapi antar kantor masih belum ada sistem yang terintegrasi. Proses pengolahan, penyampaian, dan penyajian informasi masih belum terintegrasi serta tidak real-time. Sehingga manajemen berpendapat investasi SI/TI yang telah dikeluarkan belum memberi manfaat bagi organisasi, khususnya terhadap pelayanan kepada nasabah. Manajemen menginginkan ada pengembangan SI/TI yang terencana dan sesuai dengan perkembangan organisasi. Untuk merencanakan pengembangan SI/TI yang baik diperlukan perencanaan strategis SI/TI. Perencanaan strategis dalam penelitian ini menggunakan metode Ward dan Peppard. Dalam penelitian ini dilakukan analisis internal bisnis menggunakan analisis SWOT dan value chain, serta analisis eksternal bisnis menggunakan analisis PEST, Porter’s 5 Force. Selain itu dilakukan analisis internal dan eksternal SI/TI. Hasil analisis tersebut kemudian diol...
Tuntutan akan informasi yang akurat diberbagai bidang memerlukan daya komputasi yang besar. Oleh ... more Tuntutan akan informasi yang akurat diberbagai bidang memerlukan daya komputasi yang besar. Oleh karena itu diperlukan infratruktur komputasi yang memadahi. Daya komputasi yang besar tersebut dapat disediakan oleh komputer super komputer atau main frame, yang memiliki daya komputasi berperformansi yang tinggi (High Perfomance Computing). Namun demikian komputer main frame tersebut sangat mahal biaya investasinya maupun perawatannya. Disisi lain perkembangan komputer personal (PC) demikian pesat dan ditinjau dari biaya investasi maupun perawatannya lebih murah. Disamping teknologi komputer PC yang terus meningkat, teknologi jaringan komputer seperti switch, router, juga mengalami perkembangan yang sama pesatnya. Kapasitas jaringan komputer dalam mempertukarkan paket data semakin besar seiring dengan ditemukannya teknologi jaringan pita lebar seperti Gigabit Ethernet dan kabel serat optik. Dengan mengkolaborasikan komputer PC dengan jaringan komputer memungkinkan terbentuknya komputer...
Teknologi Wireless Sensor Network (WSN) telah banyak diterapkan dalam berbagai bidang dalam memon... more Teknologi Wireless Sensor Network (WSN) telah banyak diterapkan dalam berbagai bidang dalam memonitor gejala-gejala lingkungan. Salah satu aspek yang menjadi persoalan dalam memonitor dengan menggunakan WSN adalah intensitas pemantauan yang menuntut pengguna untuk selalu mengamati dari sistem monitoring setiap saat. Seiring perkembangan teknologi, WSN telah dikombinasikan dengan teknologi lainnya, seperti Internet. Pemanfaatan Internet pada WSN mampu meningkatkan mobilitas dalam memantau WSN serta kenyamanan bagi pengguna. Salah satu cara yang digunakan untuk mengimplementasikan pemantauan WSN melalui Internet selain dengan menggunakan protokol HTTP adalah memanfaatkan protokol SIP. Protokol SIP merupakan protokol pada layer aplikasi yang umumnya dimanfaatkan dalam mengatur sesi komunikasi pada VoIP. Perancangan model dilakukan dengan mengadaptasikan arsitektur dan komponen dari protokol SIP dalam menyampaikan data sensor ke pengamat. Data disampaikan ke user apabila terjadi kejadia...
The rapid development of technology leads to improvement in a variety of computing concepts, info... more The rapid development of technology leads to improvement in a variety of computing concepts, information and communication technology(ICT). The ICT environment is become more complex and costly. Cloud Computing is one of phenomenon int the new ICT services, Cloud Computing model has three categories of services : Infrastructure As A Service (IAAS), Platform As A Service (PAAS), Software As A Service (SAAS). It also has four deployment models which are private cloud computing, community cloud, public cloud and hybrid Cloud. This research aims to determine the overhead of the virtualization environment. It is expected the private cloud with virtual technology, that utilizes the maximum resources does not degrade server scalability. The implementation of private cloud is using OpenStack with configuration multiple interfaces multiple servers. The results of the thesis indicate that the overhead of a single virtual machine is 114 ms (database server) and 212 ms (web server), to ten virt...
The network analyzer instruments are needed for monitoring, and fault identifications in a local ... more The network analyzer instruments are needed for monitoring, and fault identifications in a local network. An application program in PC based can realize this instrument. The information MAC (Medium Access Control) frames are needed to develops these applications. In Microsoft Windows environment, there are three methods to capture the MAC frames in the local network that are direct NIC (Network Interface Controller) chip access, real NIC driver access, and virtual driver NDIS access. Virtual driver NDIS is used in this research, because the methods are independent from kinds of NIC. The result of the research shows: the application can to identify MAC address, IP address, protocol transport, services, the packet content, and statistically to analyze every packet has passed in the local network. The monitoring report can be store in a file. The application has successfully analyzed some local network technology, a UTP-Ethernet LAN, a wireless LAN, and a dial-up connection. Keywords: ...
T ata kelola TI merupakan salah satu pendorong utama proses transformasi bisnis menuju good gover... more T ata kelola TI merupakan salah satu pendorong utama proses transformasi bisnis menuju good governance. Untuk menopang penggelolaan tata kelola TI, dibutuhkan SDM TI yang kompeten. Penelitian ini akan melakukan penilaian tingkat capability tata kelola TI pada aspek manajemen SDM. A l a t ukur yang digunakan pada penelitian ini adalah COBIT 5. Empat tahapan yang dilakukan dalam penelitian ini adalah pertama tahap awal yakni studi literatur, telaah dokumen dan perumusan latar belakang tujuan dan manfaat penelitian. Kedua adalah tahap pemecahan masalah meliputi identifikasi IT-related goals, pemetaan IT-related goals dengan proses COBIT 5, penyusunan kuesioner dan penentuan responden. Ketiga tahap perumusan masalah, dilakukan analisis data dan pada tahap keempat atau tahap akhir ditarik kesimpulan. Penilaian akan tingkat Capability proses COBIT mengacu kepada standar Process Assessment Model (PAM) dari ICASA. Hasil dari penilaian capability tata kelola T...
Along with the increasing need to solve various problems of numerical computation effectively and... more Along with the increasing need to solve various problems of numerical computation effectively and efficiently, the need for a computer system with high computing capability has increased. Computer systems with high computing capability (high performance computing) offers the ability to integrate the resources of multiple computers to solve a problem of numerical computing. This computer system called computer cluster. The cluster must have the ability to perform computing process by using parallel computing mechanism called message passing. In this study, the implementation of message passing mechanism on a computer cluster is done by using Open Message passing Interface (OpenMPI) application. This study aims to analyze the performance of computer cluster using MPI mechanism in handling the process in parallel computing based on the execution time, speedup, and the efficiency. Parallel computing processes will be executed with OpenMPI application to solve the problems of numerical i...
2018 10th International Conference on Information Technology and Electrical Engineering (ICITEE)
This paper presents the development of Enterprise Security Framework (ESF) for an Indonesian gove... more This paper presents the development of Enterprise Security Framework (ESF) for an Indonesian government institution called SKK Migas (Special Task Force for Upstream Oil and Gas Business Activities). The framework developed based on two security standard namely ISO 27000 and SABSA. The development is started by evaluating available information security standard and best practice used in enterprise scale. The next step is analyzing existing security policy and implementation regarding the Information Security Management System (ISMS) in SKK Migas and then perform gap analysis. The main step is the synthesis of security framework which intended to improve information security management in SKK Migas. The resulted security framework covers 14 security domains which will be used to control information security management within the institution.
ZigBee standard can be used in wireless sensor networks (WSN) with a mesh topology. WSN which for... more ZigBee standard can be used in wireless sensor networks (WSN) with a mesh topology. WSN which formed WPAN that uses ZigBee standard has the capability to thousands of WSN devices can be combined in a single WPAN. With that ability need to do testing WPAN performance parameters to get the number of WSN devices for the best performance in mesh topology. Using simulation program, the research measure throughput, traffic (sent, receive and drop), delay and hop number parameters. Testing about the influence of the number of WSN devices is done by running a simulation of the 20 kind WPAN where every WPAN has one WSN gateway and the number of WSN devices ranging from 5 and increasingly by 5 to reach the 100 WSN devices in a single WPAN. The results showed that WPAN performance with ZigBee standard in mesh topology has the best conditions when the maximum number WSN devices achieve 20 WSN devices.
Makalah ini merupakan hasil analisis unjukkerja jaringan internet di Jurusan Teknik Elektro Polit... more Makalah ini merupakan hasil analisis unjukkerja jaringan internet di Jurusan Teknik Elektro Politeknik Negeri Bandung dengan desain jaringan Multi Protocol Label Switching (MPLS) sebagai backbone. Input penelitian adalah throughput dan waktu delay antara end to end system di dalam jaringan yang dimaksud. Analisis dilakukan dengan membandingkan antara jaringan MPLS dan non MPLS terhadap input-input tersebut untuk protokol User Datagram Protocol (UDP) dan Transmission Control Protocol (TCP). Hasil penelitian menunjukan bahwa waktu delay pengiriman paket dalam jaringan MPLS relatif kecil. Sehingga jaringan MPLS ini mampu memberikan unjuk-kerja dengan tingkat layanan yang lebih optimal dan cocok untuk diterapkan bagi layanan paket data yang real time.
The high bit rate 802.11n consumes more power compared to other 802.11 modes during data transmis... more The high bit rate 802.11n consumes more power compared to other 802.11 modes during data transmission, reception, and idle (not transmitting or receiving high volume data) [1][2] and may lead to a shorter battery life in mobile devices [3]. This study investigates the transmit, receive, and idle energy consumption of 802.11 modes then forms a dynamic 802.11 mode scheme that uses different energy saving modes for different STA (Wireless Station) operations. The dynamic scheme energy consumption was compared against static schemes using a test bed that realizes seamless data communication during mode transitions. The results show that 802.11n is the most energy efficient mode to use in transmissions and receptions whereas 802.11g is the most energy efficient to use while idle. Therefore, the 802.11g-802.11n-802.11g dynamic mode scheme was formed and it was proven to be the most energy efficient scheme in ’30-second idle – 100 MB transmit – idle’ experiments whereas the static 802.11g ...
2017 9th International Conference on Information Technology and Electrical Engineering (ICITEE)
Vowel recognition is the most important part of the speech recognition process. Most spoken speec... more Vowel recognition is the most important part of the speech recognition process. Most spoken speeches must contain vowels to be sounded. It needs a method that can separate a vowel with another. The methods of the feature extraction on time domain, frequency, cepstrum, and fourier are several basic methods that can be used. This paper compares features of the strengths of the feature of zero crossing rate, energy, spectral centroid, spectral spread, spectral entropy, harmonic ratio, fundamental frequency, cepstrum, and fourier to separate and recognize vowels of a, i, u, e, and o in Indonesian dialect/language. The results show that the spectral spread feature that is one of the features in the frequency domain has the most accurate ability to recognize vowels tested compared to other features.
Protocol IEEE 802.15.4/ZigBee is a standard for low power personal network. This paper discusses ... more Protocol IEEE 802.15.4/ZigBee is a standard for low power personal network. This paper discusses about router, end device and coordinator using ZigBee protocol in term of distance and time to join. Testing carried out by pairing and On/Off method that constitute communication model from router or end device to coordinator. The result showed that with pairing methods could far distance until outside building with further distance about 65 meters, while the distance using On/Off method can reach few room in indoor area. Longest time to join need about 1 minute 15 seconds. Compare with pairing method that always connected, On/Off method need more time to connect in ZigBee Network. Protokol IEEE 802.15.4 / ZigBee merupakan standar untuk jaringan terbatas dengan konsumsi daya rendah. Paper ini membahas perangkat router, end device dan koordinator dengan protokol ZigBee terhadap jarak dan waktu gabung. Pengujian dilakukan dengan metode pairing dan On/Off, yang merupakan model komunikasi d...
Saat ini smartphone sudah menjadi kebutuhan primer bagi semua kalangan masyarakat kelas atas maup... more Saat ini smartphone sudah menjadi kebutuhan primer bagi semua kalangan masyarakat kelas atas maupun kalangan bawah. Seiring kebutuhan tersebut banyak vendor-vendor smartphone yang menawarkan harga, fitur, operating sistem dan teknologi yang berbeda-beda. Akan tetapi, keinginan dan kebutuhan masyarakat yang semakin meningkat sering tidak sesuai dengan smartphone yang diinginkan dan yang dibutuhkan. Hal tersebut menyebabkan pengguna smartphone tidak dapat menentukan pilihan yang tepat sesuai dengan kebutuhannya karena seringnya pemilihan smartphone didasarkan pada gengsi dan perilaku konsumtif masyarakat. Penelitian ini dilakukan untuk memberikan saran kepada masyarakat agar dapat memilih smartphone yang sesuai dengan karakteristik masing-masing pengguna (kebutuhan pengguna). Karakteristik pengguna didapatkan dari pengolahan 16 pertanyaan yang diajukan oleh sistem. Metode yang digunakan dalam mengolah 16 pertanyaan tersebut adalah forward chaining. Forward chaining digunakan karena da...
In the industrial world, Modbus / TCP protocol is one of the communication protocols that are wid... more In the industrial world, Modbus / TCP protocol is one of the communication protocols that are widely used in control systems to control machines connected in a network through Programmable Logic Controller (PLC). Modbus / TCP is also used as a communication protocol on the Supervisory Control And Data Acquisition (SCADA) system. Problems that exist in the industry, that special devices for Human Machine Interfaces (HMI) are relatively very expensive, for industries that are small scale, but on the contrary the price of Smartphone devices is increasingly affordable. The purpose of this study is to empower smartphones as IIoT system input devices that can transmit gyroscope, acceleration, and proximity sensor data to PLC devices using the Modbus / TCP protocol. More specifically this research is to develop an Android-based interface application program (API) that is capable of sending sensor data to PLC devices using the Modbus TCP protocol in real time. The results showed that the in...
PT. Bank BPR Jatim memiliki 74 kantor se-Jawa Timur dan harus bersaing dengan 331 BPR di Jawa Tim... more PT. Bank BPR Jatim memiliki 74 kantor se-Jawa Timur dan harus bersaing dengan 331 BPR di Jawa Timur. Sudah ada SI/TI yang digunakan tetapi antar kantor masih belum ada sistem yang terintegrasi. Proses pengolahan, penyampaian, dan penyajian informasi masih belum terintegrasi serta tidak real-time. Sehingga manajemen berpendapat investasi SI/TI yang telah dikeluarkan belum memberi manfaat bagi organisasi, khususnya terhadap pelayanan kepada nasabah. Manajemen menginginkan ada pengembangan SI/TI yang terencana dan sesuai dengan perkembangan organisasi. Untuk merencanakan pengembangan SI/TI yang baik diperlukan perencanaan strategis SI/TI. Perencanaan strategis dalam penelitian ini menggunakan metode Ward dan Peppard. Dalam penelitian ini dilakukan analisis internal bisnis menggunakan analisis SWOT dan value chain, serta analisis eksternal bisnis menggunakan analisis PEST, Porter’s 5 Force. Selain itu dilakukan analisis internal dan eksternal SI/TI. Hasil analisis tersebut kemudian diol...
Tuntutan akan informasi yang akurat diberbagai bidang memerlukan daya komputasi yang besar. Oleh ... more Tuntutan akan informasi yang akurat diberbagai bidang memerlukan daya komputasi yang besar. Oleh karena itu diperlukan infratruktur komputasi yang memadahi. Daya komputasi yang besar tersebut dapat disediakan oleh komputer super komputer atau main frame, yang memiliki daya komputasi berperformansi yang tinggi (High Perfomance Computing). Namun demikian komputer main frame tersebut sangat mahal biaya investasinya maupun perawatannya. Disisi lain perkembangan komputer personal (PC) demikian pesat dan ditinjau dari biaya investasi maupun perawatannya lebih murah. Disamping teknologi komputer PC yang terus meningkat, teknologi jaringan komputer seperti switch, router, juga mengalami perkembangan yang sama pesatnya. Kapasitas jaringan komputer dalam mempertukarkan paket data semakin besar seiring dengan ditemukannya teknologi jaringan pita lebar seperti Gigabit Ethernet dan kabel serat optik. Dengan mengkolaborasikan komputer PC dengan jaringan komputer memungkinkan terbentuknya komputer...
Teknologi Wireless Sensor Network (WSN) telah banyak diterapkan dalam berbagai bidang dalam memon... more Teknologi Wireless Sensor Network (WSN) telah banyak diterapkan dalam berbagai bidang dalam memonitor gejala-gejala lingkungan. Salah satu aspek yang menjadi persoalan dalam memonitor dengan menggunakan WSN adalah intensitas pemantauan yang menuntut pengguna untuk selalu mengamati dari sistem monitoring setiap saat. Seiring perkembangan teknologi, WSN telah dikombinasikan dengan teknologi lainnya, seperti Internet. Pemanfaatan Internet pada WSN mampu meningkatkan mobilitas dalam memantau WSN serta kenyamanan bagi pengguna. Salah satu cara yang digunakan untuk mengimplementasikan pemantauan WSN melalui Internet selain dengan menggunakan protokol HTTP adalah memanfaatkan protokol SIP. Protokol SIP merupakan protokol pada layer aplikasi yang umumnya dimanfaatkan dalam mengatur sesi komunikasi pada VoIP. Perancangan model dilakukan dengan mengadaptasikan arsitektur dan komponen dari protokol SIP dalam menyampaikan data sensor ke pengamat. Data disampaikan ke user apabila terjadi kejadia...
The rapid development of technology leads to improvement in a variety of computing concepts, info... more The rapid development of technology leads to improvement in a variety of computing concepts, information and communication technology(ICT). The ICT environment is become more complex and costly. Cloud Computing is one of phenomenon int the new ICT services, Cloud Computing model has three categories of services : Infrastructure As A Service (IAAS), Platform As A Service (PAAS), Software As A Service (SAAS). It also has four deployment models which are private cloud computing, community cloud, public cloud and hybrid Cloud. This research aims to determine the overhead of the virtualization environment. It is expected the private cloud with virtual technology, that utilizes the maximum resources does not degrade server scalability. The implementation of private cloud is using OpenStack with configuration multiple interfaces multiple servers. The results of the thesis indicate that the overhead of a single virtual machine is 114 ms (database server) and 212 ms (web server), to ten virt...
The network analyzer instruments are needed for monitoring, and fault identifications in a local ... more The network analyzer instruments are needed for monitoring, and fault identifications in a local network. An application program in PC based can realize this instrument. The information MAC (Medium Access Control) frames are needed to develops these applications. In Microsoft Windows environment, there are three methods to capture the MAC frames in the local network that are direct NIC (Network Interface Controller) chip access, real NIC driver access, and virtual driver NDIS access. Virtual driver NDIS is used in this research, because the methods are independent from kinds of NIC. The result of the research shows: the application can to identify MAC address, IP address, protocol transport, services, the packet content, and statistically to analyze every packet has passed in the local network. The monitoring report can be store in a file. The application has successfully analyzed some local network technology, a UTP-Ethernet LAN, a wireless LAN, and a dial-up connection. Keywords: ...
T ata kelola TI merupakan salah satu pendorong utama proses transformasi bisnis menuju good gover... more T ata kelola TI merupakan salah satu pendorong utama proses transformasi bisnis menuju good governance. Untuk menopang penggelolaan tata kelola TI, dibutuhkan SDM TI yang kompeten. Penelitian ini akan melakukan penilaian tingkat capability tata kelola TI pada aspek manajemen SDM. A l a t ukur yang digunakan pada penelitian ini adalah COBIT 5. Empat tahapan yang dilakukan dalam penelitian ini adalah pertama tahap awal yakni studi literatur, telaah dokumen dan perumusan latar belakang tujuan dan manfaat penelitian. Kedua adalah tahap pemecahan masalah meliputi identifikasi IT-related goals, pemetaan IT-related goals dengan proses COBIT 5, penyusunan kuesioner dan penentuan responden. Ketiga tahap perumusan masalah, dilakukan analisis data dan pada tahap keempat atau tahap akhir ditarik kesimpulan. Penilaian akan tingkat Capability proses COBIT mengacu kepada standar Process Assessment Model (PAM) dari ICASA. Hasil dari penilaian capability tata kelola T...
Along with the increasing need to solve various problems of numerical computation effectively and... more Along with the increasing need to solve various problems of numerical computation effectively and efficiently, the need for a computer system with high computing capability has increased. Computer systems with high computing capability (high performance computing) offers the ability to integrate the resources of multiple computers to solve a problem of numerical computing. This computer system called computer cluster. The cluster must have the ability to perform computing process by using parallel computing mechanism called message passing. In this study, the implementation of message passing mechanism on a computer cluster is done by using Open Message passing Interface (OpenMPI) application. This study aims to analyze the performance of computer cluster using MPI mechanism in handling the process in parallel computing based on the execution time, speedup, and the efficiency. Parallel computing processes will be executed with OpenMPI application to solve the problems of numerical i...
Uploads
Papers