ANALISIS DAN DESAIN KEAMANAN JARINGAN KOMPUTER DENGAN

Download Abstrak—Keamanan jaringan komputer merupakan hal yang tidak terpisahkan dalam jaringan komputer. Keamanan jaringan komputer yang tidak dira...

1 downloads 537 Views 550KB Size
 

$1$/,6,6'$1'(6$,1.($0$1$1 -$5,1*$1.20387(5'(1*$10(72'( NETWORK DEVELOPMENT LIFE CYCLE 678',.$68681,9(56,7$67(/.20







5DPDGKDQ7UL\DQWR3UDERZR0RFKDPDG7HJXK.XUQLDZDQ



3URJUDP6WXGL6LVWHP,QIRUPDVL)DNXOWDV5HND\DVD,QGXVWUL7HONRP8QLYHUVLW\ UDPDGKDQWUL\DQWRSUDERZR#JPDLOFRPXMDQJWHJRHK#JPDLOFRP

 



$EVWUDN².HDPDQDQ MDULQJDQ NRPSXWHU PHUXSDNDQ KDO \DQJ WLGDNWHUSLVDKNDQGDODPMDULQJDQNRPSXWHU.HDPDQDQMDULQJDQ NRPSXWHU\DQJWLGDNGLUDQFDQJGHQJDQEDLNGDSDWPHQ\HEDENDQ NHERFRUDQGDWD SHODQJJDUDQ SULYDVLKLQJJDNHUXJLDQILQDQVLDO 2OHK NDUHQD LWX GLEXWXKNDQ UDQFDQJDQ NHDPDQDQ MDULQJDQ NRPSXWHU \DQJ GDSDW PHPHQXKL NHEXWXKDQ GDUL SHQJJXQD OD\DQDQ MDULQJDQ NRPSXWHU 3HQHOLWLDQ LQL EHUWXMXDQ XQWXN PHQGHVDLQNHDPDQDQMDULQJDQNRPSXWHUGHQJDQRE\HNSHQHOLWLDQ DGDODK 8QLYHUVLWDV 7HONRP GHQJDQ PHQJJXQDNDQ 1'/& +DVLO GHVDLQ NHDPDQDQ MDULQJDQ NRPSXWHU PHQMDGL XVXODQ XQWXN SHQJHPEDQJDQ NHDPDQDQ MDULQJDQ NRPSXWHU SDGD XQLYHUVLWDV WHUVHEXW +DVLO GDQ GHVDLQ NHPDQDQ MDULQJDQ NRPSXWHU GL 8QLYHUVLWDV 7HONRP GLSHUOXNDQ DGDQ\D ,'36 XQWXN PHQGHWHNVL DGDQ\D VHUDQJDQ NDUHQD SDGD NRQGLVL existing WLGDN GDSDW WHUGHWHNVL  .DWDNXQFL8QLYHUVLWDV7HONRP.HDPDQDQ1'/&

,

 3(1'$+8/8$1

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

Jurnal Rekayasa Sistem & Industri  Volume 2, Nomor 1, Januari 2015

EHULVLsocial security numbersDODPDWWUDQVNULSQLODLDVUDPD GDQEDQWXDQNHXDQJDQPLOLNPDKDVLVZDPHQJDODPLSHUHWDVDQ VHKLQJJD GDWDGDWD WHUVHEXW GDSDW GLDNVHV ROHK \DQJ WLGDN EHUKDN >@ $SDELOD GDWDGDWD WHUVHEXW GLVDODKJXQDNDQ PDND DNDQ PHQLPEXONDQ NHUXJLDQ EDJL PDKDVLVZD 8QLYHUVLW\ RI 1HEUDVND %HUGDVDUNDQ FRQWRK WHUVHEXW NHDPDQDQ WHNQRORJL LQIRUPDVLXQWXNVHEXDKXQLYHUVLWDVKDUXVPXODLGLSHUKDWLNDQ  ,, 0(72'(3(1(/,7,$1  1HWZRUN 'HYHORSPHQW /LIH &\FOH 1'/&  PHUXSDNDQ VXDWX PHWRGH \DQJ GLJXQDNDQ GDODP PHQJHPEDQJNDQ DWDX PHUDQFDQJ MDULQJDQ LQIUDVWUXNWXU \DQJ PHPXQJNLQNDQ WHUMDGLQ\DSHPDQWDXDQMDULQJDQXQWXNPHQJHWDKXLVWDWLVWLNGDQ NLQHUMD MDULQJDQ >@ 0HWRGH LQL EHUVLIDW continuous improvement GLPDQD KDVLO GDUL DQDOLVLV DNDQ WHUXV GLMDGLNDQ VHEDJDLEDKDQSHUWLPEDQJDQXQWXNPHODNXNDQSHUEDLNDQWHUXV PHQHUXV

 *DPEDU8UXWDQPHWRGH1'/&



 'DUL*DPEDUGDSDWGLOLKDWDGDQ\DSHUEDLNDQ\DQJGLODNXNDQ WHUXVPHQHUXVGDULSHUDQFDQJDQVLPXODVLLPSOHPHQWDVLmonitoring VDPSDLNHDQDOLVLVGDQVHWHUXVQ\D  ,,, +$6,/'$13(0%$+$6$1 

3HUDQFDQJDQ NHDPDQDQ data center PHQJDFX SDGD NRQGLVLexistingGDQLGHQWLILNDVLNHEXWXKDQ'DULKDVLODQDOLVLV NRQGLVLexistingGDQNHEXWXKDQGDULSHQJJXQDdata centerPDND GDSDWGLUDQFDQJVXDWXGHVDLQNHDPDQDQdata center



%HUGDVDUNDQ PHWRGH \DQJ GLJXQDNDQ VLPXODVL GLEXWXKNDQGDODPSHQJXMLDQXQWXNPHPDVWLNDQEDKZDGHVDLQ XVXODQ GDSDW PHPHQXKL NHEXWXKDQ GDUL SHQJJXQD -LND KDVLO VLPXODVL PDPSX XQWXN PHPHQXKL NHEXWXKDQ GDUL SHQJJXQD PDNDUDQFDQJDQXVXODQNHDPDQDQdata centerGDSDWGLNDWDNDQ EHUKDVLO  $ .HDGDDQExisting .HDGDDQ existing DGDODK GDWD \DQJ GLEXWXKNDQ XQWXN PHUDQFDQJ NHDPDQDQ GDWD FHQWHU SDGD 8QLYHUVLWDV 7HONRP 'DWD NHDGDDQ existing GLGDSDWNDQ GHQJDQ FDUD PHODNXNDQ ZDZDQFDUD GL 'LUHNWRUDW 6LVWHP ,QIRUPDVL SXVDW GDQ SDGD PDVLQJPDVLQJ IDNXOWDV $GDSXQ IDNXOWDV \DQJ GLPDNVXG DGDODK )DNXOWDV 7HNQLN (OHNWUR )7(  )DNXOWDV 5HND\DVD ,QGXVWUL )5,  )DNXOWDV ,QIRUPDWLND ),)  )DNXOWDV .RPXQLNDVL %LVQLV ).%  )DNXOWDV (NRQRPL %LVQLV )(%  )DNXOWDV,OPX7HUDSDQ ),7 )DNXOWDV,QGXVWUL.UHDWLI ),.  GDQWHUGDSDWMXJD'LUHNWRUDW%DQGXQJ7HFKQR3DUN %73  



,QVLGHQ.HDPDQDQ-DULQJDQSDGD8QLYHUVLWDV 3DGD WDKXQ  VDODK VDWX IDNXOWDV SDGD 8QLYHUVLWDV \DQJ GLWHOLWL PHQHULPD VHUDQJDQ 'R6 GDUL LQWHUQHW 6HUDQJDQ WHUVHEXWPHQJJXQDNDQSURWRNRO8'3GHQJDQportWXMXDQGLDWDV  +DO LWX PHQJDNLEDWNDQ EHEHUDSD VHUYHU WLGDN GDSDW GLDNVHV3HQ\HEDEQ\DDGDODKWLGDNDGDQ\DSHUOLQGXQJDQVHUYHU SDGDVHUDQJDQ'R6''R6 3DGDWDKXQ\DQJVDPDIDNXOWDVODLQSDGD8QLYHUVLWDV\DQJ VDPDPHQHULPDVHUDQJDQdefaceSDGDVDODKVDWXVHUYHUQ\D 



7RSRORJL-DULQJDQExisting 7RSRORJLMDULQJDQexistingDGDODKVHEDJDLEHULNXW 3DGD *DPEDU  8QLYHUVLWDV PHPLOLNL OLPD EXDK router GHQJDQ PHUHN -XQLSHU \DQJ GLPLOLNL ROHK PDVLQJPDVLQJ IDNXOWDV 3DGD router \DQJ WHUKXEXQJ NH ,QWHUQHW router WHUVHEXWMXJDPHPLOLNLILWXUfirewall



.RQGLVL'0= 'LWLQMDXGDULWRSRORJL\DQJDGDfirewall\DQJGLOHWDNNDQ SDGD MDULQJDQ '0= \DQJ PHQJKDGDS NH MDULQJDQ SXEOLN ,QWHUQHW  PHQJJXQDNDQ SHUDQJNDW -XQLSHU WLSH 65;  .RQILJXUDVLfirewallLQLPHPXQJNLQNDQSHQJJXQDGDUL,QWHUQHW XQWXN PHQJDNVHV EHEHUDSD VHUYHU SHQWLQJ PHQJJXQDNDQ SURWRNRO+773GDQ66+1DPXQNKXVXVXQWXNNRQHNVL66+ KDQ\D GLEDWDVL VHEDQ\DN  NRQHNVL VHODPD VDWX PHQLW XQWXN VHWLDS,3address Firewall \DQJ GLJXQDNDQ SDGD MDULQJDQ LQL WLGDN GLWHUDSNDQ PHNDQLVPH monitoring +DO LQL PHQJDNLEDWNDQ NRQGLVL real-time firewall WHUVHEXW VXOLW GLDZDVL GHQJDQ EDLN VHKLQJJD WHUGDSDW EHEHUDSD DNLEDW \DQJ GLWLPEXONDQ VHSHUWL load &38 NHWHUVHGLDDQ memory GDQ NRQGLVL ODOX OLQWDV GDWD PHQMDGLVXOLWGLNHWDKXL 

% 3HUDQFDQJDQ.HDPDQDQData Center8VXODQ %HUGDVDUNDQ KDVLO DQDOLVLV \DQJ WHODK GLODNXNDQ PDND DNDQ GLODNXNDQ SHUDQFDQJDQ NHDPDQDQ MDULQJDQ NRPSXWHU GL 8QLYHUVLWDV  7RSRORJL-DULQJDQ8VXODQ 7RSRORJLMDULQJDQNRPSXWHU\DQJGLXVXONDQGDSDWGLOLKDW SDGD*DPEDU 3DGD MDULQJDQ XVXODQ GLODNXNDQ SHQDPEDKDQ SHUDQJNDW intrusion detection/prevention system \DQJ WHUOHWDN DQWDUD firewall GHQJDQ '0= 6HODLQ LWX EHEHUDSD data center \DQJ WHUGLVWULEXVLSDGDPDVLQJPDVLQJIDNXOWDVGLWHPSDWNDQWHUSXVDW SDGD server farm \DQJ WHUOHWDN GL EHODNDQJ ,'6 XQWXN PHPXGDKNDQSHQJHORODDQ  'LDJUDP/D\DQDQ8VXODQ 5DQFDQJDQ GLDJUDP OD\DQDQ XVXODQ DGDODK VHEDJDL EHULNXW





'LDJUDP/D\DQDQExisting 3DGD *DPEDU  OD\DQDQ \DQJ GLVHGLDNDQ SDGD layer Internet edge DGDODK firewall :$1 routing VHNDOLJXV PHQMDODQNDQ IXQJVL high-speed routing SDGD layer core /D\DQDQ \DQJ GLEHULNDQ ROHK ,QWHUQHW edge layer WXPSDQJ WLQGLK GHQJDQ OD\DQDQ \DQJ GLEHULNDQ ROHK core layer 6DWX VDWXQ\DSHUOLQGXQJDQSDGDGDWDFHQWHUDGDODKfirewall  *DPEDU'LDJUDPOD\DQDQXVXODQ



3DGD*DPEDUdata centerWLGDNODJLPHQMDGLWDQJJXQJ MDZDE PDVLQJPDVLQJ IDNXOWDV WHWDSL WHUSXVDW GDQ PHQMDGL WDQJJXQJMDZDE'LUHNWRUDW6LVWHP,QIRUPDVL8QLYHUVLWDV 6HODLQ LWX ORNDVL data center EHUDGD GL EHODNDQJ aggregation layer \DQJPHPEHULNDQOD\DQDQNHDPDQDQVHSHUWL intrusion detection/prevention system GDQ firewall VHKLQJJD GDWDFHQWHUPHQMDGLOHELKWHUOLQGXQJ  *DPEDU'LDJUDPOD\DQDQexisting



& 6LPXODVL3HUEDQGLQJDQ.HDGDDQExistingGHQJDQ8VXODQ  8QWXN PHQJHWDKXL HIHNWLYLWDV GDUL NHDGDDQ XVXODQ GLEDQGLQJNDQ GHQJDQ NHDGDDQ existing PDND GLODNXNDQ VLPXODVLSDGDOLQJNXQJDQ\DQJWHUNRQWURO

$QDOLVLVGDQ'HVDLQ.HDPDQDQ-DULQJDQ.RPSXWHUGHQJDQ0HWRGHNetwork Development Life Cycle    6WXGL.DVXV8QLYHUVLWDV7HONRP Ramadhan Triyanto Prabowo, Mochamad Teguh Kurniawan (hal. 1 – 7)

 



 *DPEDU7RSRORJLMDULQJDQGDQGDWDFHQWHUexisting



 *DPEDU7RSRORJLMDULQJDQGDQGDWDFHQWHUXVXODQ



6LPXODVL6HUDQJDQ'R6''R6 6DODK VDWX VHUDQJDQ \DQJ SHUQDK WHUMDGL DGDODK 8'3 flooding$NDQGLODNXNDQVLPXODVLXQWXNPHQJHWDKXLGDPSDN GDUL VHUDQJDQ WHUVHEXW 6LPXODVL GLODNXNDQ GHQJDQ FDUD PHQJLULPNDQSDNHW8'3VHFDUDWHUXVPHQHUXVROHKVDWXKLQJJD HPSDW KRVW ODOX GLXNXU MXPODK ODOX OLQWDV SDNHW 8'3 SDGD

Jurnal Rekayasa Sistem & Industri  Volume 2, Nomor 1, Januari 2015

server. 3DGD *DPEDU  GDSDW GLVLPSXONDQ EDKZD GDODP LQWHUYDOGHWLNUDWDUDWDGDSDWGLEDQMLULODOXOLQWDVSDNHWGDWD EHUXUXWDQ  GDUL    GDQ  0ESV VHGDQJNDQ VHWHODKGLODNXNDQVLPXODVLWHUKDGDSXVXODQNHDPDQDQMDULQJDQ NRPSXWHUKDVLOQ\DGDSDWGLOLKDWSDGD*DPEDU



  +RVW

 

+RVW



+RVW



+RVW

1 17 33 49 65 81 97 113

%LW



'HWLN *DPEDU*UDILNODOXOLQWDVVHUDQJDQ'R6''R6



                    

          

GLPXQJNLQNDQ XQWXN PHODQMXWNDQ SHQJXMLDQ GHQJDQ SHQDPEDKDQSHQ\HUDQJ   6LPXODVL3HQJXNXUDQ(IHNWLYLWDV,'36 6DODK VDWX XVXODQ \DQJ GLEHULNDQ XQWXN PHQLQJNDWNDQ NHDPDQDQ DGDODK SHUOLQGXQJDQ data center GDUL DQFDPDQ SHUHWDV PHQJJXQDNDQ SHUDQJNDW Intrusion Detection/Prevention System ,'36  $GD EDQ\DN MHQLV VHUDQJDQ\DQJGDSDWGLGHWHNVLROHK,'36EHEHUDSDGLDQWDUDQ\D DGDODK VHUDQJDQ 7&3 6<1 flood GDQ VHUDQJDQ 8'3 flood 6LPXODVLGLODNXNDQGHQJDQFDUDPHQJLULPNDQSDNHW6<1GDQ SDNHW8'3VHFDUDWHUXVPHQHUXV *DPEDUDGDODKKDVLOGDUL VLPXODVLVHUDQJDQ7&36<1IORRG 

'HWLN

8'3 ELWV

*DPEDU*UDILNODOXOLQWDVVHUDQJDQSDGDXVXODQ



3DGD *DPEDU  GDSDW GLVLPSXONDQ EDKZD GDODP ZDNWX  GHWLN KDQ\D DGD ODOX OLQWDV SDNHW 8'3 UDWDUDWD  NESV 6HUDQJDQ LQL GLODNXNDQ ROHK VDWX host -XPODK LQL FXNXS EHUEHGDMLNDGLEDQGLQJNDQGHQJDQWDQSDSHUOLQGXQJDQWHUKDGDS 'R6'GR6.HWLNDGLODNXNDQSHQJXMLDQVHUDQJDQROHKGXDhost GLGDSDWNDQKDVLOVHSHUWL*DPEDU 

*DPEDU7&36<1DWWDFN



3DGD(UURU5HIHUHQFHVRXUFHQRWIRXQGDPEDUGDSDW GLVLPSXONDQEDKZDSHUDQJNDW,'36GDSDWPHQGHWHNVLVHUDQJDQ 7&36<1flood*DPEDUPHPSHULKDWNDQVLPXODVLVHUDQJDQ 8'3flood 

*DPEDU+DVLOGHWHNVLVHUDQJDQ8'3IORRG

3DGD *DPEDU  GDSDW GLVLPSXONDQ EDKZD SHUDQJNDW  ,'36PHQGHWHNVLVHUDQJDQWHUVHEXWGDQGDSDWPHODNXNDQDNVL *DPEDU6HUDQJDQROHKGXDhost GURSSDGDSDNHWKLQJJDSDNHW  3DGD*DPEDUGDSDWGLOLKDWEDKZDVHUDQJDQ'R6''R6 ROHK GXD KRVW SDGD MDULQJDQ XVXODQ PHQ\HEDENDQ SHUDQJNDW  6LPXODVL931XQWXN.RQHNVL66+ .RQHNVL 66+ GLSHUOXNDQ XQWXN PHQJDNVHV GDQ \DQJPHQ\HGLDNDQOD\DQDQSHUOLQGXQJDQWHUKDGDS'R6''R6 WLGDN PDPSX PHQDQJDQL SDNHW GDWD \DQJ PDVXN VHKLQJJD PHQJHQGDOLNDQserverGDULMDUDNMDXK.RQHNVLLQLKDUXVDPDQ SHUDQJNDW WHUVHEXW PHPDWLNDQ interface XQWXN PHQFHJDK NDUHQDNRQHNVLLQLPHPSHUEROHKNDQSHQJJXQDGDULMDUDNMDXK VHUDQJDQ WHUVHEXW EHUODQMXW +DO LQL PHQJDNLEDWNDQ WLGDN XQWXN GDSDW PHODNXNDQ SHUXEDKDQ VLVWHP SDGD VHUYHU 2OHK



$QDOLVLVGDQ'HVDLQ.HDPDQDQ-DULQJDQ.RPSXWHUGHQJDQ0HWRGHNetwork Development Life Cycle    6WXGL.DVXV8QLYHUVLWDV7HONRP Ramadhan Triyanto Prabowo, Mochamad Teguh Kurniawan (hal. 1 – 7)



  VHEDELWXGLSHUOXNDQ931XQWXNPHQJDPDQNDQNRQHNVL66+ ' $QDOLVLV 6HWHODK GLODNXNDQ SHUDQFDQJDQ GDQ VLPXODVL  PDND *DPEDUDGDODKSHQJXMLDQNRQHNVL66+WDQSD931 GLODNXNDQDQDOLVLVDSDNDKNHDPDQDQMDULQJDQNRPSXWHUXVXODQ  OD\DNGDQPDPSXPHPHQXKLNHEXWXKDQSHQJJXQDDWDXWLGDN  $QDOLVLV3HUEDQGLQJDQExistingGHQJDQ8VXODQ $UVLWHNWXU MDULQJDQ GDQ GDWD FHQWHU \DQJ LGHDO KDUXV  PHQFDNXSOD\DQDQOD\DQDQVHSHUWLOD\DQDQInternet edge, core *DPEDU.RQHNVL66+WDQSD931 data center\DQJWHUSLVDKGHQJDQMDULQJDQLQWHUQDOaggregation layer server farm layered access network GDQ disaster 3DGD*DPEDUGDSDWGLVLPSXONDQEDKZDNRQHNVL66+ recovery center >@. WDQSD 931 WLGDN GDSDW GLODNXNDQ VHKLQJJD WLGDN ELVD PHODNXNDQ PHODNXNDQ remote GDQ SHUXEDKDQ VLVWHP SDGD server. 6HWHODKGLODNXNDQSHQJXMLDQNRQHNVL66+GHQJDQ931 KDVLOQ\DDGDODKVHEDJDLEHULNXW 

*DPEDU'LDJUDPOD\DQDQLGHDO

*DPEDU.RQHNVL931

*DPEDU.RQHNVL66+EHUKDVLOGLODNXNDQ





6LPXODVL GLODNXNDQ GHQJDQ SHUDQJNDW OXQDN &LVFR $Q\&RQQHFW &OLHQW 6LPXODVL LQL PHPEXWXKNDQ SURVHV RWHQWLNDVLVHEDQ\DNNDOL\DLWXRWHQWLNDVL931GDQRWHQWLNDVL 66+6HWHODKNRQHNVL931EHUKDVLOGLODNXNDQPDNDSHQJJXQD GDSDW PHODNXNDQ NRQHNVL 66+ SDGD server PHQJJXQDNDQ private,3addressPLOLNserver.

Jurnal Rekayasa Sistem & Industri  Volume 2, Nomor 1, Januari 2015



3DGD*DPEDUVHWLDSlayerPHPLOLNLNRPSRQHQ\DQJ UHGXQGDQ VHKLQJJD WLGDN DGD single point of failure +DO LQL GLEXWXKNDQDJDUNHWHUVHGLDDQOD\DQDQPHQLQJNDW 3DGD VLVL internet edge OD\DQDQ \DQJ GLVHGLDNDQ DGDODK OD\DQDQ :$1 routing GDQ NHDPDQDQ 3HUDQJNDW \DQJ GLJXQDNDQ PHOLSXWL firewall, intrusion detection system GDQ intrusion prevention system 'L VLVL core OD\DQDQ \DQJ GLVHGLDNDQDGDODKroutingDQWDUDMDULQJDQLQWHUQDOdata center GDQ public :$1 DWDX ,QWHUQHW 3DGD OD\HU LQL GLEXWXKNDQ OD\DQDQ forwarding data \DQJ FHSDW GDQ redundan NDUHQD PHQJKXEXQJNDQ WLJD OD\DQDQ NULWLV 3DGD VLVL aggregation OD\DQDQ \DQJ GLVHGLDNDQ DGDODK OD\DQDQ UHGXQGDQVL default gateway VHKLQJJD data center GDSDW PHQFDSDL NHWHUVHGLDDQ \DQJ WLQJJL 3DGD OD\HU LQL SXOD intrusion detection system Network Analysis Module 1$0 GDQSHUOLQGXQJDQVHUDQJDQ 'R6''R6 GLLPSOHPHQWDVLNDQ 'L server farm layer DGDODK OD\DQDQOD\DQDQ DSOLNDVL GDQ SHQ\LPSDQDQ GDWD \DQJ GLEXWXKNDQROHKRUJDQLVDVL3DGDlayerLQLSXODEHEHUDSDDWDX VHPXD DSOLNDVLDSOLNDVL GDQ GDWDGDWD SHQWLQJ GLODNXNDQ backupNHdisaster recovery 'L MDULQJDQ \DQJ PHOD\DQL SHQJJXQD MDULQJDQ WHUGDSDW distribution layer \DQJ PHPEHULNDQ OD\DQDQ VHSHUWL inter 9/$1 routing access list quality of service 4R6  GDQ UHGXQGDQVL default gateway SDGD SHQJJXQD XQWXN PHQLQJNDWNDQ NHWHUVHGLDDQ OD\DQDQ 3DGD access layer GLWHUDSNDQ OD\DQDQ \DQJ PHQJKXEXQJNDQ ODQJVXQJ GHQJDQ SHQJJXQD VHSHUWL power over ethernet 3R(  patch panel switchGDQOD\DQDQwireless 3HUEDQGLQJDQ DQWDUD GLDJUDP OD\DQDQ existing GHQJDQ GLDJUDPOD\DQDQLGHDOPHPLOLNLPHPLOLNLSHUEHGDDQ\DLWXWLGDN DGDQ\D aggregation layer Layer LQL SHQWLQJ NDUHQD



PHQ\HGLDNDQ OD\DQDQ UHGXQGDQVL default gateway intrusion detection systemnetwork analysis moduleGDQPHQ\HGLDNDQ SHUOLQGXQJDQWHUKDGDSVHUDQJDQ'R6''R66HODLQLWXinternet edge layerWLGDNUHGXQGDQGDQGLOHWDNNDQPHQMDGLVDWXGHQJDQ core layer VHKLQJJD PHQJDNLEDWNDQ NRQGLVL single point of failure\DQJPHQ\HEDENDQNHWHUVHGLDDQOD\DQDQWLGDNWHUMDPLQ 6HODLQLWXMLNDDGDVHUDQJDQ\DQJGLODNXNDQSDGDMDULQJDQ LQWHUQDO /$1 PDNDdata center\DQJDGDGLEHEHUDSDIDNXOWDV PHQMDGLWLGDNWHUOLQGXQJLNDUHQDODOXOLQWDVGDWDGDULMDULQJDQ LQWHUQDONHdata centerWLGDNWHUOLQGXQJROHKfirewall.



*DPEDU&RQWRKVHUDQJDQGDULMDULQJDQLQWHUQDO

%HUGDVDUNDQ*DPEDUWHUGDSDWNHPXQJNLQDQVHUDQJDQ SDGDMDULQJDQLQWHUQDO /$1 NDUHQDDNVHVPHQXMXdata center WLGDN GLOLQGXQJL ROHK firewall 2OHK NDUHQD LWX GLEXWXKNDQ GHVDLQ MDULQJDQ \DQJ PHPXQJNLQNDQ data center GDSDW WHUOLQGXQJROHKfirewall.  $QDOLVLV+DVLO6LPXODVL $QDOLVLV KDVLO VLPXODVL GLSHUOXNDQ XQWXN PHQJHWDKXL DSDNDK NHDPDQDQ MDULQJDQ NRPSXWHU XVXODQ WHODK GDSDW PHPHQXKL NHEXWXKDQ NHDPDQDQ MDULQJDQ NRPSXWHU SDGD 8QLYHUVLWDV  $QDOLVLV6LPXODVL6HUDQJDQ'R6''R6 3DGD GDSDW GLVLPSXONDQ EDKZD VHPDNLQ EDQ\DN MXPODK KRVW \DQJ EHUSDUWLVLSDVL GDODP VHUDQJDQ 8'3 flood PDND VHPDNLQ EDQ\DN SXOD ODOX OLQWDV SDNHW 8'3 +DO LQL GDSDW PHQJKDELVNDQ bandwidth \DQJ WHUVHGLD VHKLQJJD ODOX OLQWDV GDWD \DQJ QRUPDO WLGDN PHQGDSDW SRUVL bandwidth \DQJ VHPHVWLQ\D -LND GLEDQGLQJNDQ GHQJDQ ODOX OLQWDV SDNHW 8'3 SDGD XVXODQ NHDPDQDQ MDULQJDQ NRPSXWHU DGDODK VHEDJDL EHULNXW  14000000 12000000 10000000 8000000 6000000 4000000 2000000 0

Eksisting

1 22 43 64 85 106

Usulan

Detik *DPEDU3HUEDQGLQJDQexistingGHQJDQXVXODQ





*DPEDUPHQ\DWDNDQEDKZDSHUEDQGLQJDQDQWDUDODOX OLQWDV SDNHW 8'3 SDGD MDULQJDQ existing GHQJDQ XVXODQ PHPLOLNL SHUEHGDDQ VHEHVDU  VHKLQJJD GDSDW GLVLPSXONDQEDKZDXVXODQNHDPDQDQMDULQJDQNRPSXWHUGDSDW PHPHQXKLNHEXWXKDQSHUWDKDQDQWHUKDGDS'R6''R6  $QDOLVLV6LPXODVL3HQJXNXUDQ(IHNWLYLWDV,'36 $QDOLVLVVLPXODVLSHQJXNXUDQHIHNWLYLWDV,'36GLSHUOXNDQ XQWXN PHQJHWDKXL DSDNDK SHUDQJNDW ,'36 \DQJ GLXVXONDQ GDSDW PHPHQXKL NHEXWXKDQ GHWHNVL SHQ\HUDQJDQ SDGD data center. %HUGDVDUNDQ GDWD SDGD *DPEDU  GDQ *DPEDU  PHQ\DWDNDQ EDKZD SHUDQJNDW ,'36 PDPSX PHQJHQDOL EHEHUDSD VHUDQJDQ GDQ GDSDW PHQGHWHNVL PDXSXQ PHQFHJDK VHUDQJDQWHUVHEXWWHUMDGL.HDPDQDQMDULQJDQNRPSXWHUXVXODQ WHODK PDPSX XQWXN PHPHQXKL NHEXWXKDQ NHDPDQDQ MDULQJDQ NRPSXWHU  $QDOLVLV6LPXODVL931XQWXN.RQHNVL66+ $QDOLVLV VLPXODVL 931 XQWXN NRQHNVL 66+ GLSHUOXNDQ XQWXN PHQJHWDKXL DSDNDK WHNQRORJL 931 PDPSX XQWXN PHQLQJNDWNDQNHDPDQDQNRQHNVL66+GDULMDULQJDQSXEOLNDWDX ,QWHUQHW +DVLO SHQJXMLDQ PHQXQMXNNDQ EDKZD NRQHNVL 66+ WDQSD PHQJJXQDNDQ 931 WLGDN GLPXQJNLQNDQ 6HGDQJNDQ NRQHNVL 66+ VHWHODK SHQHUDSDQ WHNQRORJL 931 GDSDW GLODNXNDQ  ,9.(6,038/$1  'DULSHQHOLWLDQ\DQJWHODKGLODNXNDQPDNDGDSDWGLWDULN NHVLPSXODQVHEDJDLEHULNXW   3DGD WDKDS LGHQWLILNDVL NHDPDQDQ MDULQJDQ NRPSXWHU 8QLYHUVLWDV 7HONRP GHQJDQ PHQJJXQDNDQ PHWRGH 1'/& XQWXN WDKDS DQDOLVLV GLGDSDW KDVLO VHEDJDL EHULNXW D 7HODK PHQHUDSNDQ OD\DQDQ NHDPDQDQ XQWXN MDULQJDQLQWHUQDOGDQ'0=WHWDSLEHEHUDSDserver GLEHEHUDSDIDNXOWDVWLGDNWHUOLQGXQJGDULVHUDQJDQ \DQJEHUDVDOGDULMDULQJDQLQWHUQDO E /RNDVL data center \DQJ WHUSLVDK PHQ\HEDENDQ SHQJHORODDQ NHDPDQDQ SDGD data center PHQMDGL VXOLWGLODNXNDQ F -DULQJDQNRPSXWHUSDGD8QLYHUVLWDV7HONRPEHOXP PHQHUDSNDQ SHUOLQGXQJDQ WHUKDGDS 'R6''R6 ROHK NDUHQD LWX SDGD NHDPDQDQMDULQJDQ NRPSXWHU XVXODQ GLODNXNDQ SHQDPEDKDQ SHUOLQGXQJDQ WHUKDGDS'R6''R6   5DQFDQJDQNHDPDQDQMDULQJDQNRPSXWHUGL8QLYHUVLWDV 7HONRPGLXVXONDQGHQJDQPHQJJXQDNDQPHWRGH1'/& SDGDWDKDSGHVDLQGDQVLPXODWRUDGDODKVHEDJDLEHULNXW D GDWDFHQWHUGL8QLYHUVLWDV7HONRPEHOXPGLEHULNDQ OD\DQDQXQWXNPHQGHWHNVLGDQPHQFHJDKVHUDQJDQ ROHK NDUHQD LWX GLEHULNDQ XVXODQ SHQDPEDKDQ OD\DQDQ ,'36 XQWXN PHQGHWHNVL GDQ PHQFHJDK VHUDQJDQ WHUMDGL +DVLO SHQJXMLDQ PHQXQMXNNDQ EDKZD SHUDQJNDW XVXODQ GDSDW PHPHQXKL NHEXWXKDQWHUVHEXW E .RQHNVL 66+ NH server GDUL MDULQJDQ SXEOLN WLGDN GLEHULNDQNHDPDQDQWDPEDKDQVHKLQJJDGLSHUOXNDQ WHNQRORJL 931 XQWXN PHQLQJNDWNDQ NHDPDQDQ

$QDOLVLVGDQ'HVDLQ.HDPDQDQ-DULQJDQ.RPSXWHUGHQJDQ0HWRGHNetwork Development Life Cycle    6WXGL.DVXV8QLYHUVLWDV7HONRP Ramadhan Triyanto Prabowo, Mochamad Teguh Kurniawan (hal. 1 – 7)

  NRQHNVL66++DVLOSHQJXMLDQSDGDNRQGLVLexisting PDXSXQ XVXODQ NHDPDQDQ MDULQJDQ NRPSXWHU PHQXQMXNNDQ EDKZD NRQHNVL 66+ WLGDN GLPXQJNLQNDQ MLND SHQJJXQD EHOXP WHUNRQHNVL GHQJDQ931VHGDQJNDQVHWHODKGLODNXNDQNRQHNVL GHQJDQ931PDNDNRQHNVL66+GDSDWGLODNXNDQ   3DGDWDKDSmonitoringSDGDPHWRGH1'/&GLGDSDW XVXODQVHEDJDLEHULNXW D 'LEHULNDQ XVXODQ DJDU server WHUVHEXW WHUOLQGXQJ ROHKILUHZDOO E 'LEHULNDQ XVXODQ XQWXN SHQHPSDWDQ data center VHFDUDWHUSXVDWDJDUPHPXGDKNDQSHQJHORODDQ  >@ >@

>@ >@

'$)7$53867$.$  .HPHQWULDQ 3HQGLGLNDQ 1DVLRQDO Kamus Besar Bahasa Indonesia-DNDUWD%DODL3XVWDND 8QLYHUVLW\ RI 1HEUDVND  0D\  8QLYHUVLW\ RI 1HEUDVND >2QOLQH@ KWWSQHEUDVNDHGXPHGLDUHVRXUFH FHQWHUQHZVUHOHDVHVXQLYHUVLW\RIQHEUDVND LQYHVWLJDWLQJVHFXULW\EUHDFKLQWRVWXGHQWLQIRUPDWLRQ V\VWHPKWPO DPHV ( *ROGPDQ DQG 3KLOOLS 7 5DZOHV Applied Data Communication: A Business-Oriented Approach 1HZ
Jurnal Rekayasa Sistem & Industri  Volume 2, Nomor 1, Januari 2015