Untuk membangun jaringan pada kantor BUMD, dibutuhkan perangkat- perangkat jaringan seperti Router, Modem, Access Point, kabel UTP agar kebutuhan jaringan terpenuhi. Router digunakan untuk mengatur lalulintas jaringan seperti management bandwidth, pemberian IP (DHCP), authentication user. Modem sebagai koneksi ke ISP, dan Access Point sebagai koneksi wireless ke client. Dalam penyelesaian proyek ini beberapa tahap yang harus diselesaikan yaitu : menentukan area akses jaringan, menentukan topologi jaringan, menentukan alat –alat yang dibutuhkan, menentukan spesifikasi alat-alat yang dibutuhkan, dan menetukan IP yang digunakan sesuai dengan kebutuhan jaringan, dan pengujian terhadap jaringan (implementasi). Hasil yang diharapkan adalah dapat memberi suatu fasilitas yang berfungsi untuk sharing koneksi internet dan dapat menekan biaya agar lebih hemat, dan juga dapat dikembangkan penggunaannya untuk penggunaan atau manfaat lain pada jaringan.
Data security is an important factor in an electronic transaction, because the data sent must only be known to the person who is entitled to receive the information. There are several security aspects of the data that must be maintained, such as: authentication, integrity, non repudiation, authority, confidentialty, privacy and access control. Therefore we are need for a system that is capable of carrying out some of these aspects. One technique that can be used in maintaining data security is steganography with the LSB (Least Significant Bit) method. In addition, to strengthen the confidentiality of the hidden information in steganography needed Additional techniques in the form of cryptography namely RC4 (Rivest Code 4). In this research,, the researcher used a software development model is a prototype. And for the tools used in developing this application is an Unified Modeling Language. The results of the research conducted by researchers are the application of steganography using the LSB (Least Significant Bit) method combined with RC4 cryptography (Rivest Code 4) proven to be able to hide and secure important information from people who do not have access rights to that information. Keywords: Steganography, Criptography, Data Security
DNS is made to facilitate users in accessing a website with a domain without having to continually update the files host.txt.DNS was developed in 1983, every user accessing a website using a domain name through a browser, will be routed by the router to a public DNS serverto get a web address in the form of ip address.It takes time for DNS servers to reverse and lookup for translate domain names into ip addresses and vice versa.By creating a local DNS server as a cache,then it can be applied forwarding technique on DNS Server,so the time required to find the web server address of a destination website becomes faster. In addition to minimizing query time by implementing a local DNS server, can also be filtered against a particular domain name even though using a secure protocol like httpsby creating a zone for the web address you want to filter. So the use of the Internet becomes more useful. In this study the software used linux debian 8 as the operating system, and BIND9 as the software that runs the function of DNS Server.Keywords:Forwarding DNS,BIND 9, Debian 8Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â
Development of Information Technology is currently supporting dissemination of information quickly so that it can be accessed by mobile from anywhere and at anytime, STMIK Atma Luhur Pangkalpinang As one - the only college-based Information and Communication Technology (ICT) should also follow these developments, one system is information systems employees (SIMPEG), where the system will contain detailed information such as number of employees, history rank, history position, length of service and the other - the other, so that could be a reference material led to consider a promotion, a raise or other parts that need data employees. The system is web-based for easy access from anywhere and anytime through any device that has a browser and an internet connection and is created using CodeIgniter and Bootstrap framework, and reports can be converted into the form of a spreadsheet. The method used in this research is qualitative method in which the author is a key tool in data collection, by means of observation and interviews.Keywords:ICT, SIMPEG, CodeIgniter, Bootstrap, Qualitative
Load balancing is a technique within the network that functions to divide the network into two or more links with the aim that internet access needed by clients on the network does not experience problems. However, there are various methods that can be used in the load balancing technique, so it is necessary to test the performance of these methods in order to choose which method has better performance. In this study, the methods implemented in the load balancing technique are ECMP and NTH. The research methodology used is qualitative and comparative, and PPDIOO as a network development model. By applying the comparative method, there is a comparison of the results of testing load balancing techniques using the ECMP and NTH methods. Testing is done by downloading files in two different sizes, with criteria less than 100 MB and more than 100 MB. Performance analysis of Quality of Service (QoS) is based on four parameters. There are throughput, delay, jitter and packet loss. The results of the Quality of Service (QoS) load balancing technique are the best after being tested and compared based on predetermined parameters. It concludes that the NTH method is slightly better than ECMP because it has a slightly larger throughput value.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.