Pub Date : 2019-01-07DOI: 10.14421/IJID.2018.07202
Tri Setya Dermawan
Abstract - The best route is the path found based on the minimum price of a train journey using the Dijkstra and Floyd-Warshall algorithms. This study aims to find out the comparison of Dijkstra and Floyd-Warshall algorithms in finding the best path on a train trip. The results of route discovery will be displayed in a web-based application using the PHP programming language and MySQL database. The results of these two algorithms are compared using 4 parameters: time complexity, memory complexity, level of completion and level of optimization.Based on the comparison results from the implementation that Dijkstra's algorithm has a time complexity of 81 faster than the Floyd-Warshall algorithm. For the memory complexity, Dijkstra's algorithm uses a memory of 512616 bytes less than the Floyd-Warshall algorithm for the executive category. Whereas for the economic category the Dijkstra algorithm uses a memory of 482488 bytes less than the Floyd-Warshall algorithm. For the level of completion of the two algorithms, there is no error. In addition, for the level of optimization the Dijkstra algorithm has advantages in this study, namely the data used is dynamic or variable data in each stage of the process.
{"title":"Comparison of Dijkstra dan Floyd-Warshall Algorithm to Determine the Best Route of Train","authors":"Tri Setya Dermawan","doi":"10.14421/IJID.2018.07202","DOIUrl":"https://doi.org/10.14421/IJID.2018.07202","url":null,"abstract":"Abstract - The best route is the path found based on the minimum price of a train journey using the Dijkstra and Floyd-Warshall algorithms. This study aims to find out the comparison of Dijkstra and Floyd-Warshall algorithms in finding the best path on a train trip. The results of route discovery will be displayed in a web-based application using the PHP programming language and MySQL database. The results of these two algorithms are compared using 4 parameters: time complexity, memory complexity, level of completion and level of optimization.Based on the comparison results from the implementation that Dijkstra's algorithm has a time complexity of 81 faster than the Floyd-Warshall algorithm. For the memory complexity, Dijkstra's algorithm uses a memory of 512616 bytes less than the Floyd-Warshall algorithm for the executive category. Whereas for the economic category the Dijkstra algorithm uses a memory of 482488 bytes less than the Floyd-Warshall algorithm. For the level of completion of the two algorithms, there is no error. In addition, for the level of optimization the Dijkstra algorithm has advantages in this study, namely the data used is dynamic or variable data in each stage of the process.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49413468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-07DOI: 10.14421/IJID.2018.07205
M. Alfani, B. Sugiantoro
As an institution engaged in SMK Muhammadiyah 03 Yogyakarta requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication between router. This leads to the main router performance overburdened which makes the network infrastructure down. It is necessary to reform the network, especially in the communication protocol on the router by using protocol Open Shortest Path First(OSPF). OSPF is a link state-based routing protocol that uses Dijkstra’s algorithm to find the best path is taken as a communication medium. Makin paths made by considering various aspects of the parameters that affect network traffic. OSPF can minimize down on network infrastructure caused by the buren of a huge traffic to maintain the stability of traffic on communication lines. The results using the method QOS on infrastructure with the OSPF protocol can be classified very nice. It is obtaine from the measurement parameter delay <150 ms, packet loss (0%), an bandwidth has a very goo category based on the standard TIPHON. From the results of the QOS parameters also obtained a decrease in delay value by 31% on infrastructure with the OSPF protocol. This proves that the network traffic is more stable when using OSPF protocol.
{"title":"Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF)","authors":"M. Alfani, B. Sugiantoro","doi":"10.14421/IJID.2018.07205","DOIUrl":"https://doi.org/10.14421/IJID.2018.07205","url":null,"abstract":"As an institution engaged in SMK Muhammadiyah 03 Yogyakarta requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication between router. This leads to the main router performance overburdened which makes the network infrastructure down. It is necessary to reform the network, especially in the communication protocol on the router by using protocol Open Shortest Path First(OSPF). OSPF is a link state-based routing protocol that uses Dijkstra’s algorithm to find the best path is taken as a communication medium. Makin paths made by considering various aspects of the parameters that affect network traffic. OSPF can minimize down on network infrastructure caused by the buren of a huge traffic to maintain the stability of traffic on communication lines. The results using the method QOS on infrastructure with the OSPF protocol can be classified very nice. It is obtaine from the measurement parameter delay <150 ms, packet loss (0%), an bandwidth has a very goo category based on the standard TIPHON. From the results of the QOS parameters also obtained a decrease in delay value by 31% on infrastructure with the OSPF protocol. This proves that the network traffic is more stable when using OSPF protocol.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48420421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-07DOI: 10.14421/IJID.2018.07204
Firmansyah Gustav Hikmatyar, B. Sugiantoro
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.
{"title":"Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases","authors":"Firmansyah Gustav Hikmatyar, B. Sugiantoro","doi":"10.14421/IJID.2018.07204","DOIUrl":"https://doi.org/10.14421/IJID.2018.07204","url":null,"abstract":"As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49581289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-07DOI: 10.14421/ijid.2018.07203
Ireicca Agustiorini Harsehanto, M. D. R. Wahyudi
Abstract - This research uses data from social media Twitter based on the results of tweets from user_timeline @basuki_btp and @aniesbaswedan. This study uses 2100 tweet data. Data that has been collected is then pre-processed first and labeled manually. The next process is classification using the Naïve Bayess Classifier Algorithm using the Big Five Personality Theory. Based on the test results using 500 tweet data as training data and 1600 tweet data as testing data. The classification results obtained by using the Naïve Bayes Classifier Method and grouped in the "Big Five" personality groups: Openness, Conscientiousness, Extraversion, Agreeableness and Neuroticism on tweet data in Indonesian.
{"title":"Analysis of Personality Characteristic Using the Naïve Bayess Classifier Algorithm (Case Study Official Twitter of Basuki Tjahaja Purnama's and Anies Baswedan)","authors":"Ireicca Agustiorini Harsehanto, M. D. R. Wahyudi","doi":"10.14421/ijid.2018.07203","DOIUrl":"https://doi.org/10.14421/ijid.2018.07203","url":null,"abstract":"Abstract - This research uses data from social media Twitter based on the results of tweets from user_timeline @basuki_btp and @aniesbaswedan. This study uses 2100 tweet data. Data that has been collected is then pre-processed first and labeled manually. The next process is classification using the Naïve Bayess Classifier Algorithm using the Big Five Personality Theory. Based on the test results using 500 tweet data as training data and 1600 tweet data as testing data. The classification results obtained by using the Naïve Bayes Classifier Method and grouped in the \"Big Five\" personality groups: Openness, Conscientiousness, Extraversion, Agreeableness and Neuroticism on tweet data in Indonesian.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46219388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-07DOI: 10.14421/IJID.2018.07201
M. U. Siregar, Devara Eko Katon Mahardika
Universitas Proklamasi 45 Yogyakarta is a private university which is supervised by a Foundation that has implemented various information systems in various fields of work. However, in the payroll process of the employees are still done manually and have not utilized a computerized system, such as attendance recap, wage recapitulation that is additional salary to basic salary, and the sum of salary received by employees. This makes the payroll process less effective and efficient. This study aims to establish a proposed system that is a web-based information system of employee payroll in the Universitas Proklamasi 45 Yogyakarta with the PHP programming language using Codeigniter Framework and MySQL as its database. The system development method used is the Extreme Programming method. This method was chosen because it promotes intense communication between the client and the system developer so that when there are changes or errors in the system, the developer is always ready to fix it. Extreme Programming also has a simple stage, namely planning, design, coding, and testing. The results of this study are the result of a web-based employee payroll information system that has various actors involved in the management and processing of its data. With this information system, the employee payroll process becomes more effective and efficient, because payroll data is processed and calculated by the system so that it has a high level of data accuracy and does not require a long time in the calculation process.
Universitas Proklamasi 45 Yogyakarta是一所私立大学,由一个基金会监督,该基金会在各个工作领域实施了各种信息系统。然而,在员工的工资发放过程中,仍然是手工完成的,并没有采用计算机化的系统,如考勤汇总,工资汇总,即基本工资的附加工资,以及员工收到的工资总额。这使得薪资流程的效率和效率降低。本研究的目的是在Universitas Proklamasi 45 Yogyakarta建立一个基于web的员工工资信息系统,该系统采用PHP编程语言,使用Codeigniter框架和MySQL作为数据库。使用的系统开发方法是极限编程方法。之所以选择这种方法,是因为它促进了客户端和系统开发人员之间的紧密沟通,以便当系统中出现更改或错误时,开发人员总是准备好修复它。极限编程也有一个简单的阶段,即计划、设计、编码和测试。本研究的结果是基于web的员工工资信息系统的结果,该系统有各种参与者参与其数据的管理和处理。有了这个信息系统,员工的工资单处理变得更加有效和高效,因为工资单数据是由系统进行处理和计算的,因此具有很高的数据准确性,并且在计算过程中不需要花费很长的时间。
{"title":"An Implementation of Web-Based Payroll Information System in Universitas Proklamasi 45 Yogyakarta","authors":"M. U. Siregar, Devara Eko Katon Mahardika","doi":"10.14421/IJID.2018.07201","DOIUrl":"https://doi.org/10.14421/IJID.2018.07201","url":null,"abstract":"Universitas Proklamasi 45 Yogyakarta is a private university which is supervised by a Foundation that has implemented various information systems in various fields of work. However, in the payroll process of the employees are still done manually and have not utilized a computerized system, such as attendance recap, wage recapitulation that is additional salary to basic salary, and the sum of salary received by employees. This makes the payroll process less effective and efficient. This study aims to establish a proposed system that is a web-based information system of employee payroll in the Universitas Proklamasi 45 Yogyakarta with the PHP programming language using Codeigniter Framework and MySQL as its database. The system development method used is the Extreme Programming method. This method was chosen because it promotes intense communication between the client and the system developer so that when there are changes or errors in the system, the developer is always ready to fix it. Extreme Programming also has a simple stage, namely planning, design, coding, and testing. The results of this study are the result of a web-based employee payroll information system that has various actors involved in the management and processing of its data. With this information system, the employee payroll process becomes more effective and efficient, because payroll data is processed and calculated by the system so that it has a high level of data accuracy and does not require a long time in the calculation process.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":"7 1","pages":"48-53"},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66960615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-04DOI: 10.14421/IJID.2018.07107
Prasdika Prasdika, B. Sugiantoro
In the digital era like today the growth of data in the database is very rapid, all things related to technology have a large contribution to data growth as well as social media, financial technology and scientific data. Therefore, topics such as big data and data mining are topics that are often discussed. Data mining is a method of extracting information through from big data to produce an information pattern or data anomaly
{"title":"A Review Paper on Big Data and Data Mining Concepts and Techniques","authors":"Prasdika Prasdika, B. Sugiantoro","doi":"10.14421/IJID.2018.07107","DOIUrl":"https://doi.org/10.14421/IJID.2018.07107","url":null,"abstract":"In the digital era like today the growth of data in the database is very rapid, all things related to technology have a large contribution to data growth as well as social media, financial technology and scientific data. Therefore, topics such as big data and data mining are topics that are often discussed. Data mining is a method of extracting information through from big data to produce an information pattern or data anomaly ","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43580829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-28DOI: 10.14421/ijid.2018.07104
M. U. Siregar, J. Derrick
This paper describes our research on implementing a scanner and parsers for Z specifications. Rather to code them from scratch, we use tools that have specialities on creating such tasks. These tools generate several Java files which can be integrated with a main program in Java. Our research could produce a scanner and parser for Z specifications. These tools could benefit Z specifications to be studied further.
{"title":"A Scanner and Parser for Z Specifications","authors":"M. U. Siregar, J. Derrick","doi":"10.14421/ijid.2018.07104","DOIUrl":"https://doi.org/10.14421/ijid.2018.07104","url":null,"abstract":"This paper describes our research on implementing a scanner and parsers for Z specifications. Rather to code them from scratch, we use tools that have specialities on creating such tasks. These tools generate several Java files which can be integrated with a main program in Java. Our research could produce a scanner and parser for Z specifications. These tools could benefit Z specifications to be studied further.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45750604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-28DOI: 10.14421/ijid.2017.06201
Bima Putra Winasis, B. Sugiantoro
A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.
{"title":"Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification","authors":"Bima Putra Winasis, B. Sugiantoro","doi":"10.14421/ijid.2017.06201","DOIUrl":"https://doi.org/10.14421/ijid.2017.06201","url":null,"abstract":"A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43406410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-28DOI: 10.14421/ijid.2018.07101
Muh. Hambali, B. Sugiantoro
In the rapid development of technology and the increasing speed of information flow due to globalization, making the role of information is vital and crucial to an educational institution. Institutions of Sunan Pandanaran implement policies of separate education system among male students with female students. This triggered a few problems, especially in the Senior high school of Sunan Pandanaran where researched by the author. The focus of the research is how to implement thearchitecture of Representational State Transfer (REST) on the integrated system academic information between two separate data server so that student academic data can be served easily from two different servers. Through the system resulting from this research, researchers offered easy access to student academic data that can then be recycled by the user into a useful information. The research methodology where used in this research is system development. The steps begin with a preliminary study research,data collection, design models, identifying system requirements and system development methods.At the end, this research produced a integrated academic system information between male school servers with a female school server where implemented using Representational State Transfer architecture. So that student academic data can be presented either to the user in order to be recycled into useful information.
随着科技的飞速发展和全球化带来的信息流动速度的加快,发挥信息的作用对于教育机构来说是至关重要的。苏南潘达那兰各院校实行男女分教制度。这引发了一些问题,特别是在笔者所研究的苏南潘达那兰高中。研究的重点是如何在两个独立的数据服务器之间实现集成系统学术信息的Representational State Transfer (REST)架构,使学生的学术数据可以从两个不同的服务器上轻松地提供服务。通过这项研究产生的系统,研究人员可以方便地访问学生的学术数据,然后用户可以将这些数据回收为有用的信息。本研究使用的研究方法是系统开发。这些步骤从初步研究、数据收集、设计模型、确定系统需求和系统开发方法开始。最后,本研究在男性学校服务器和女性学校服务器之间产生了一个集成的学术系统信息,其中使用具象状态转移架构实现。这样,学生的学术数据既可以呈现给用户,也可以回收为有用的信息。
{"title":"The Implementation of Representation State Transfer (REST) Architecture Academic Information System Integrated in Pandanaran Islamic Senior High School","authors":"Muh. Hambali, B. Sugiantoro","doi":"10.14421/ijid.2018.07101","DOIUrl":"https://doi.org/10.14421/ijid.2018.07101","url":null,"abstract":"In the rapid development of technology and the increasing speed of information flow due to globalization, making the role of information is vital and crucial to an educational institution. Institutions of Sunan Pandanaran implement policies of separate education system among male students with female students. This triggered a few problems, especially in the Senior high school of Sunan Pandanaran where researched by the author. The focus of the research is how to implement thearchitecture of Representational State Transfer (REST) on the integrated system academic information between two separate data server so that student academic data can be served easily from two different servers. Through the system resulting from this research, researchers offered easy access to student academic data that can then be recycled by the user into a useful information. The research methodology where used in this research is system development. The steps begin with a preliminary study research,data collection, design models, identifying system requirements and system development methods.At the end, this research produced a integrated academic system information between male school servers with a female school server where implemented using Representational State Transfer architecture. So that student academic data can be presented either to the user in order to be recycled into useful information.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45379013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-28DOI: 10.14421/IJID.2017.06205
R. Dewantara, S. Iskandar, A. Fatwanto
High-performance academic information systems and high availability services are requirement in every university. One of many reasons is for anticipation damage and fail server disrupting server network performance. Failover computer cluster method is applied to two servers: primary server as main server and secondary server as backup server. Four stages will be carried out: First: Installation and support software configuration. Second: installation and failover cluster configuration. Third: installation and Distributed Replicated Block Devices (DRBD) configuration. Forth: server testing with siege and nettool.This research conducted by doing server test before and after high availability. As if the main server has a system failure, it will automatically backup the main server to backup server to minimize user accessed data failures. System uses Ubuntu 16.04 LTS operating system. Based on the test data, it is acquired two data: packet data and data response time (ms). Data packets acquired from this research are: 233.3 average data sent; 228.3 average data received; 2.3 average data lost; while 59.7 average response time (ms) is showed; 2.7 minimum average; 633.8 maximum average. Data sent is 120B per data.
{"title":"Availability Analysis with Failover Computer Cluster Method Case Study in Academic Information System of UIN Sunan Kalijaga","authors":"R. Dewantara, S. Iskandar, A. Fatwanto","doi":"10.14421/IJID.2017.06205","DOIUrl":"https://doi.org/10.14421/IJID.2017.06205","url":null,"abstract":"High-performance academic information systems and high availability services are requirement in every university. One of many reasons is for anticipation damage and fail server disrupting server network performance. Failover computer cluster method is applied to two servers: primary server as main server and secondary server as backup server. Four stages will be carried out: First: Installation and support software configuration. Second: installation and failover cluster configuration. Third: installation and Distributed Replicated Block Devices (DRBD) configuration. Forth: server testing with siege and nettool.This research conducted by doing server test before and after high availability. As if the main server has a system failure, it will automatically backup the main server to backup server to minimize user accessed data failures. System uses Ubuntu 16.04 LTS operating system. Based on the test data, it is acquired two data: packet data and data response time (ms). Data packets acquired from this research are: 233.3 average data sent; 228.3 average data received; 2.3 average data lost; while 59.7 average response time (ms) is showed; 2.7 minimum average; 633.8 maximum average. Data sent is 120B per data.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49165194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}