Pub Date : 2019-06-22DOI: 10.14421/IJID.2019.08104
Irwin Wijaya Lahusen, Widyawan Widyawan, S. Kusumawardani
Implementation of the BGP Confederation topology scenario, found a number of new facts that influence the final decision making for BGP network managers. In previous studies it has been mentioned a number of factors that influence QoS from a topology scheme, among others, the number of Sub AS and the number of routers that make up the iBGP topology. In this study, a number of scenarios were developed by giving variants to bandwidth parameters and adding measurement parameters to Lost Datagram in all scenarios. The results obtained are quite significant, affecting QoS and finding a number of new facts related to the effect of using traffic generators. This research was tested on the Indonesia Research and Education Network (IdREN) network using GNS3.
{"title":"Topology Analysis of iBGP Confederation Case : Indonesia Research and Education Network (IdREN)","authors":"Irwin Wijaya Lahusen, Widyawan Widyawan, S. Kusumawardani","doi":"10.14421/IJID.2019.08104","DOIUrl":"https://doi.org/10.14421/IJID.2019.08104","url":null,"abstract":"Implementation of the BGP Confederation topology scenario, found a number of new facts that influence the final decision making for BGP network managers. In previous studies it has been mentioned a number of factors that influence QoS from a topology scheme, among others, the number of Sub AS and the number of routers that make up the iBGP topology. In this study, a number of scenarios were developed by giving variants to bandwidth parameters and adding measurement parameters to Lost Datagram in all scenarios. The results obtained are quite significant, affecting QoS and finding a number of new facts related to the effect of using traffic generators. This research was tested on the Indonesia Research and Education Network (IdREN) network using GNS3.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66960624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-22DOI: 10.14421/IJID.2019.08103
Puguh Jayadi, F. Wahid
The integration of learning and Information Technology (IT) currently has a good impact on education. Besides making it easy, IT also provides opportunities to achieve learning goals anytime and anywhere. Many studies have discussed how to achieve successful learning through IT. IT here only serves as a support for learning, not as a science. This research develops a model or instrument used to achieve learning success by placing IT as a science. As a result, a learning model was successfully developed by combining several perspectives related to IT; students (Background, desire, and skill), teacher (teaching), and institution (infrastructure).
{"title":"Information Technology as Science: A New Model for Learning","authors":"Puguh Jayadi, F. Wahid","doi":"10.14421/IJID.2019.08103","DOIUrl":"https://doi.org/10.14421/IJID.2019.08103","url":null,"abstract":"The integration of learning and Information Technology (IT) currently has a good impact on education. Besides making it easy, IT also provides opportunities to achieve learning goals anytime and anywhere. Many studies have discussed how to achieve successful learning through IT. IT here only serves as a support for learning, not as a science. This research develops a model or instrument used to achieve learning success by placing IT as a science. As a result, a learning model was successfully developed by combining several perspectives related to IT; students (Background, desire, and skill), teacher (teaching), and institution (infrastructure).","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46722727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-22DOI: 10.14421/IJID.2019.08106
M. Anshari
A successful healthcare organization exists when it provides good quality service. Powered by technological changes like big data, cloud computing, and Internet of Things, healthcare information is accessed and owned and the patient has become evolving within the healthcare environment. This affects the relationship between healthcare provider and customers, and between patients. Electronic Health Records (EHRs) and Electronic Medical Records (EMRs) are considered as a building block for electronic health development. Many literatures use both terms EHR and EMR interchangeably with no clear distinction in terms of scope and dimensions. The aim of the research is to examine the distinct role of EHR from EMR in order to promote patients’ empowerment. While, patient empowerment in e-health will enhance patients’ satisfaction, improve their health literacy, and involve patient in the process of health decision making.
{"title":"Redefining Electronic Health Records (EHR) and Electronic Medical Records (EMR) to Promote Patient Empowerment","authors":"M. Anshari","doi":"10.14421/IJID.2019.08106","DOIUrl":"https://doi.org/10.14421/IJID.2019.08106","url":null,"abstract":"A successful healthcare organization exists when it provides good quality service. Powered by technological changes like big data, cloud computing, and Internet of Things, healthcare information is accessed and owned and the patient has become evolving within the healthcare environment. This affects the relationship between healthcare provider and customers, and between patients. Electronic Health Records (EHRs) and Electronic Medical Records (EMRs) are considered as a building block for electronic health development. Many literatures use both terms EHR and EMR interchangeably with no clear distinction in terms of scope and dimensions. The aim of the research is to examine the distinct role of EHR from EMR in order to promote patients’ empowerment. While, patient empowerment in e-health will enhance patients’ satisfaction, improve their health literacy, and involve patient in the process of health decision making.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47062120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-22DOI: 10.14421/ijid.2019.08102
Rossi Adi Nugroho, B. Nafi'ah
Indonesia has a disparity in internet access caused by differences in regional factors, especially in geographically difficult areas to reach. The disparity in internet access is narrowed by the existence of programs through USO funds. However, the researchers found that the equalization program for internet access using USO funds had not been effective, especially in the education sector. This paper aims to provide an evaluation of USO-funded programs. This paper uses qualitative descriptive methods with review literature data collection techniques accompanied by qualitative critical analysis techniques. The important finding of this study is that the internet access equalization program has not been effective as evidenced by the ineffectiveness of this program in the education sector. Researchers suggest optimizing the internet access equalization program through USO funds to improve the quality of education.
{"title":"Internet Access Equity Policy Is the Internet Access Equity Policy Through USO Funds effective?","authors":"Rossi Adi Nugroho, B. Nafi'ah","doi":"10.14421/ijid.2019.08102","DOIUrl":"https://doi.org/10.14421/ijid.2019.08102","url":null,"abstract":"Indonesia has a disparity in internet access caused by differences in regional factors, especially in geographically difficult areas to reach. The disparity in internet access is narrowed by the existence of programs through USO funds. However, the researchers found that the equalization program for internet access using USO funds had not been effective, especially in the education sector. This paper aims to provide an evaluation of USO-funded programs. This paper uses qualitative descriptive methods with review literature data collection techniques accompanied by qualitative critical analysis techniques. The important finding of this study is that the internet access equalization program has not been effective as evidenced by the ineffectiveness of this program in the education sector. Researchers suggest optimizing the internet access equalization program through USO funds to improve the quality of education.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41726424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-22DOI: 10.14421/IJID.2019.08108
R. Hidayat, Sekar Minati
Qur'an, As-Sunnah, and Islamic old book have become the sources for Islam followers as sources of knowledge, wisdom, and law. But in daily life, there are still many Muslims who do not understand the meaning of the sentence in the Qur'an even though they read it every day. It becomes a challenge for Science and Engineering field academicians especially Informatics to explore and represent knowledge through intelligent system computing to answer various questions based on knowledge from the Qur'an. This research is creating an enabling computational environment for text mining the Qur'an, of which purpose is to facilitate people to understand each verse in the Qur'an. The classification experiment uses Support Vector Machine (SVM), Naive Bayes, k-Nearest Neighbor (kNN), and J48 Decision Tree classifier algorithms with Al-Baqarah verses translated to English and Indonesian as the dataset which was labeled by three most fundamental aspects of Islam: 'Iman' (faith), 'Ibadah' (worship), and 'Akhlaq' (virtues). Indonesian translation was processed by using the sastrawi package in Python to do the pre-processing and StringToWord Vector in WEKA with the TF-IDF method to implement the algorithms. The classification experiments are determined to measure accuracy, and f-measure, it tested with a percentage split 66% as the data training and the rest as the data testing. The decision from an experiment that was carried out by the classification results, SVM classifier algorithms have the overall best accuracy performance for the Indonesian translation of 81.443% and the Naïve Bayes classifier has the best accuracy for the English translation, which achieved 78.35%.
{"title":"Comparative Analysis of Text Mining Classification Algorithms for English and Indonesian Qur’an Translation","authors":"R. Hidayat, Sekar Minati","doi":"10.14421/IJID.2019.08108","DOIUrl":"https://doi.org/10.14421/IJID.2019.08108","url":null,"abstract":"Qur'an, As-Sunnah, and Islamic old book have become the sources for Islam followers as sources of knowledge, wisdom, and law. But in daily life, there are still many Muslims who do not understand the meaning of the sentence in the Qur'an even though they read it every day. It becomes a challenge for Science and Engineering field academicians especially Informatics to explore and represent knowledge through intelligent system computing to answer various questions based on knowledge from the Qur'an. This research is creating an enabling computational environment for text mining the Qur'an, of which purpose is to facilitate people to understand each verse in the Qur'an. The classification experiment uses Support Vector Machine (SVM), Naive Bayes, k-Nearest Neighbor (kNN), and J48 Decision Tree classifier algorithms with Al-Baqarah verses translated to English and Indonesian as the dataset which was labeled by three most fundamental aspects of Islam: 'Iman' (faith), 'Ibadah' (worship), and 'Akhlaq' (virtues). Indonesian translation was processed by using the sastrawi package in Python to do the pre-processing and StringToWord Vector in WEKA with the TF-IDF method to implement the algorithms. The classification experiments are determined to measure accuracy, and f-measure, it tested with a percentage split 66% as the data training and the rest as the data testing. The decision from an experiment that was carried out by the classification results, SVM classifier algorithms have the overall best accuracy performance for the Indonesian translation of 81.443% and the Naïve Bayes classifier has the best accuracy for the English translation, which achieved 78.35%.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45333442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-06-22DOI: 10.14421/ijid.2019.08101
E. Suharto, A. P. Widodo, S. Suryono
In education quality assurance, the accuracy of test data is crucial. However, there is still a problem regarding to the possibility of incorrect data filled by test taker during paper-based test. On the contrary, this problem does not appear in computer-based test. In this study, a method was proposed in order to analyze the accuracy of answer sheet filling out in paper-based test using data mining technique. A single layer of data comprehension was added within the method instead of raw data. The results of the study were a web-based program for data pre-processing and decision tree models. There were 374 instances which were analyzed. The accuracy of answer sheet filling out attained 95.19% while the accuracy of classification varied from 99.47% to 100% depend on evaluation method chosen. This study could motivate the administrators for test improvement since it preferred computer-based test to paper-based.
{"title":"Analyzing the Accuracy of Answer Sheet Data in Paper-based Test Using Decision Tree","authors":"E. Suharto, A. P. Widodo, S. Suryono","doi":"10.14421/ijid.2019.08101","DOIUrl":"https://doi.org/10.14421/ijid.2019.08101","url":null,"abstract":"In education quality assurance, the accuracy of test data is crucial. However, there is still a problem regarding to the possibility of incorrect data filled by test taker during paper-based test. On the contrary, this problem does not appear in computer-based test. In this study, a method was proposed in order to analyze the accuracy of answer sheet filling out in paper-based test using data mining technique. A single layer of data comprehension was added within the method instead of raw data. The results of the study were a web-based program for data pre-processing and decision tree models. There were 374 instances which were analyzed. The accuracy of answer sheet filling out attained 95.19% while the accuracy of classification varied from 99.47% to 100% depend on evaluation method chosen. This study could motivate the administrators for test improvement since it preferred computer-based test to paper-based.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41513613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-09DOI: 10.14421/IJID.2018.07207
S. Iskandar, S. Sumarsono, Norma Latief Fitriyani, Sendy Aditya Suryana
Abstract— Implementation is one of phases in Software Development Life Cycle (SDLC). Programmer as software development lead actor decided whether software is completed on time or postpone according to development schedule. Data Warehouse and IT Center (PTIPD) as a software developer official vendor in UIN Sunan Kalijaga, they developed a growing number of software to facilitate administrative processes in college academic community. This is an analysis to determine the factors that most influence the developers. The object of this research are 9 (nine) people. They are all software programmer in PTIPD. The research using Mixed Methods Research that combines two methods of research, qualitative and quantitative. Two factors from previous research are factors materialistic and non-materialistic factors. Materialistic factors are Reward and Punishment; Career Development and Contra-Accomplishment, Incentive and Bonus. Non-Materialistic factors are: Usefulness; Relationships and Spirituality. Preliminary data taken from interviews, observation and documentation study to discover object opinions and views. Validity Test and Reliability Test using SPSS software for qualitative data is provided. The most influence factor for programmer performance SDLC of PTIPD UIN Sunan Kalijaga is Usefulness with the highest value at 3 (three) informant: Oscar, Bravo, Mike and Relations with the highest value at 3 (three) informant: Delta, Sierra, Zulu . Keywords: Career development, programmer performance, relationship, sequential explanatory, mixed method research.
{"title":"Programmer Performance Influence Factors with Sequential Explanatory Model Case Study in Data Warehouse and IT Center of UIN Sunan Kalijaga Yogyakarta","authors":"S. Iskandar, S. Sumarsono, Norma Latief Fitriyani, Sendy Aditya Suryana","doi":"10.14421/IJID.2018.07207","DOIUrl":"https://doi.org/10.14421/IJID.2018.07207","url":null,"abstract":"Abstract— Implementation is one of phases in Software Development Life Cycle (SDLC). Programmer as software development lead actor decided whether software is completed on time or postpone according to development schedule. Data Warehouse and IT Center (PTIPD) as a software developer official vendor in UIN Sunan Kalijaga, they developed a growing number of software to facilitate administrative processes in college academic community. This is an analysis to determine the factors that most influence the developers. The object of this research are 9 (nine) people. They are all software programmer in PTIPD. The research using Mixed Methods Research that combines two methods of research, qualitative and quantitative. Two factors from previous research are factors materialistic and non-materialistic factors. Materialistic factors are Reward and Punishment; Career Development and Contra-Accomplishment, Incentive and Bonus. Non-Materialistic factors are: Usefulness; Relationships and Spirituality. Preliminary data taken from interviews, observation and documentation study to discover object opinions and views. Validity Test and Reliability Test using SPSS software for qualitative data is provided. The most influence factor for programmer performance SDLC of PTIPD UIN Sunan Kalijaga is Usefulness with the highest value at 3 (three) informant: Oscar, Bravo, Mike and Relations with the highest value at 3 (three) informant: Delta, Sierra, Zulu . Keywords: Career development, programmer performance, relationship, sequential explanatory, mixed method research.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44755245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-09DOI: 10.14421/IJID.2018.07208
Ramadhan Gatra, Reonaldo Akbar, B. Sugiantoro, Naufal Asyhab
Abstract— The need for security and convenience in carrying out data requires all users to be able to create a safer network, both in terms of data communication and in terms of sharing internet connection lines. The effectiveness of performance in work is always required to be able to work quickly and on time without the constraints of one of the high data traffic that causes problems in network devices in one building. Which ultimately causes all work to be hampered in its completion. With the management of VLANs in a LAN connection, it will be able to parse problems especially in terms of data communication and logical data transmission. (Abstract)Keywords: LAN, VLAN, Network
{"title":"VLAN-based LAN Network Management Comparison using Cisco and Brocade","authors":"Ramadhan Gatra, Reonaldo Akbar, B. Sugiantoro, Naufal Asyhab","doi":"10.14421/IJID.2018.07208","DOIUrl":"https://doi.org/10.14421/IJID.2018.07208","url":null,"abstract":"Abstract— The need for security and convenience in carrying out data requires all users to be able to create a safer network, both in terms of data communication and in terms of sharing internet connection lines. The effectiveness of performance in work is always required to be able to work quickly and on time without the constraints of one of the high data traffic that causes problems in network devices in one building. Which ultimately causes all work to be hampered in its completion. With the management of VLANs in a LAN connection, it will be able to parse problems especially in terms of data communication and logical data transmission. (Abstract)Keywords: LAN, VLAN, Network ","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49332078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-09DOI: 10.14421/ijid.2018.07108
Cahyo Pramudyo
To handle the information exchange problem between a vendor and a retailer, Vendor Managed Inventory (VMI) provides a good approach to handle the problem. Information exchanges between both sides enhance supply chain performance. In a previous research work, a stochastic model for one vendor and one retailer has been developed. Simulation optimization using genetic algorithm (GA) has been use to solve the problem. There are 2 important parameters in genetic algorithm (probability of mutation and probability of crossover). This research aims at analyzing relations between GA parameters and optimal solutions. This research compares many combinations of GA parameters and the effects on optimal solutions and time to reach the optimal solutions. This research concludes that the best combination reaches the optimal solutions. Unfortunately, the best combination is only suitable for a certain condition and increasing/reducing GA parameters values do not automatically improve the optimal solutions.
{"title":"Genetic Algorithm Parameters in a Vendor Managed Inventory Model","authors":"Cahyo Pramudyo","doi":"10.14421/ijid.2018.07108","DOIUrl":"https://doi.org/10.14421/ijid.2018.07108","url":null,"abstract":"To handle the information exchange problem between a vendor and a retailer, Vendor Managed Inventory (VMI) provides a good approach to handle the problem. Information exchanges between both sides enhance supply chain performance. In a previous research work, a stochastic model for one vendor and one retailer has been developed. Simulation optimization using genetic algorithm (GA) has been use to solve the problem. There are 2 important parameters in genetic algorithm (probability of mutation and probability of crossover). This research aims at analyzing relations between GA parameters and optimal solutions. This research compares many combinations of GA parameters and the effects on optimal solutions and time to reach the optimal solutions. This research concludes that the best combination reaches the optimal solutions. Unfortunately, the best combination is only suitable for a certain condition and increasing/reducing GA parameters values do not automatically improve the optimal solutions.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42675445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-09DOI: 10.14421/IJID.2018.07206
Asep Wishnu, B. Sugiantoro
The growing number of internet users in Indonesia, making the number of users increasing especially video streaming on Youtube service. This increase is based on rapid technological developments, especially PCs, Laptops and Smartphones that use wireless or wireless internet access. The use of streaming video over wireless networks is different from cable networks Because The characteristics of wireless networks are limited Compared to wired networks, and the characteristics of streaming video transmissions that require different handling than traditional text, and the data transmissions. As a first step towards Achieving an optimum Internet network service effort, Applies Action Research This research method by utilizing video quality with 360p, 480p, and 720p. The QOS parameters Analyzed Consist of delay, jitter, throughput, packet loss and bandwidth using wireshark and NetTools for the testing phase. The results of analysis using QoS for streaming video shows the performance of wireless network services at UIN Sunan Kalijaga, Faculty of Science and Technology is still not maximal especially on video with 480p quality, that has a 20 ms delay and jitter quality level ms According -0.0269 to TIPHON is very good. The amount of throughput is 0:55 MBps throughput and the percentage is 3% and the packet loss value is 28%, if it is Categorized by TIPHON standardization bad this value falls into the category. For the average bandwidth used is 329 714 bps value.
{"title":"Analysis Of Quality Of Service (Qos) Youtube Streaming Video Service In Wireless Network In The Environment Faculty Of Science And Technology Uin Sunan Kalijaga","authors":"Asep Wishnu, B. Sugiantoro","doi":"10.14421/IJID.2018.07206","DOIUrl":"https://doi.org/10.14421/IJID.2018.07206","url":null,"abstract":"The growing number of internet users in Indonesia, making the number of users increasing especially video streaming on Youtube service. This increase is based on rapid technological developments, especially PCs, Laptops and Smartphones that use wireless or wireless internet access. The use of streaming video over wireless networks is different from cable networks Because The characteristics of wireless networks are limited Compared to wired networks, and the characteristics of streaming video transmissions that require different handling than traditional text, and the data transmissions. As a first step towards Achieving an optimum Internet network service effort, Applies Action Research This research method by utilizing video quality with 360p, 480p, and 720p. The QOS parameters Analyzed Consist of delay, jitter, throughput, packet loss and bandwidth using wireshark and NetTools for the testing phase. The results of analysis using QoS for streaming video shows the performance of wireless network services at UIN Sunan Kalijaga, Faculty of Science and Technology is still not maximal especially on video with 480p quality, that has a 20 ms delay and jitter quality level ms According -0.0269 to TIPHON is very good. The amount of throughput is 0:55 MBps throughput and the percentage is 3% and the packet loss value is 28%, if it is Categorized by TIPHON standardization bad this value falls into the category. For the average bandwidth used is 329 714 bps value.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41529491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}