Pelatihan Topologi Jaringan Menggunakan Cisco Packet Tracer untuk Meningkatkan Kompetensi Mahasiswa Politeknik Angkatan Darat Malang
DOI:
https://doi.org/10.37478/mahajana.v2i2.848Abstract
The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.
Downloads
Keywords:
Network topology, Packet tracer, Topology simulationReferences
Hadiyati, E., Astuti, R., & others. (2020). Pengaruh Pendidikan Dan Pelatihan Terhadap Promosi Jabatan Melalui Kinerja (Studi Pada Tenaga Pendidik Di POLTEKAD). Jurnal Ekonomi Dan Manajemen, 21(1), 01–11.
Hambali, H., Aulia, R., & Mardalius, M. (2018). WORKSHOP SIMULASI JARINGAN DASAR KOMPUTER MENGGUNAKAN CISCO PACKET TRACER. Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal, 1(2), 33–40.
Hamid, A., & Listriyanto, A. (2014). Implementasi Jaringan Virtual Privat Network (Vpn) dan Teknologi Jaringan Vlan pada Kantor Kecamatan Pasar Rebo. Jurnal Techno Nusa Mandiri, 11(1), 11–16.
Khasanah, S. N. (2016). Keamanan Jaringan Dengan Packet Filtering Firewall (Studi Kasus: PT. Sukses Berkat Mandiri Jakarta). Jurnal Khatulistiwa Informatika, 4(2).
Papathanasaki, M., Dimitriou, G., Maglaras, L., Vasileiou, I., & Janicke, H. (2020). From Cyber Terrorism to Cyber Peacekeeping: Are we there yet? ArXiv Preprint ArXiv:2010.07041.
Rhynaidie, K. B. P. (2019). Regulasi Penanganan Kejahatan Siber di Lingkungan Tni Angkatan Darat [Masters, Universitas Terbuka]. http://repository.ut.ac.id
Samsumar, L. D., & Subli, M. (2019). PENGGUNAAN APLIKASI SIMULASI JARINGAN CISCO PACKET TRACER DALAM DESIGN NETWORK. EXPLORE, 9(1), 24–30.
Sitoresmi, A. S. (2019). SANKSI APARAT PENEGAK HUKUM YANG MELANGGAR KUHAP DALAM MENANGGULANGI KEJAHATAN. Jurnal Jurisprudence, 8(2), 68–73.
Soewardi, B. (2013). Perlunya Pembangunan Sistem Pertahanan Siber (Cyber Defense) yang tangguh bagi Indonesia. Media Informasi Ditjen Pothan Menhan.
Tarkaa, N. S., Iannah, P. I., & Iber, I. T. (2017). Design and simulation of local area network using cisco packet tracer. The International Journal of Engineering and Science, 6(10), 63–77.
Tjiptady, B. C., Rohman, M., Saepuddin, A., Fadliana, A., & Choirina, P. (2021). Pelatihan Assembly Cadd Inventor 2021 Untuk Meningkatkan Kapabilitas Guru Pemesinan di Era Revolusi Industri 4.0. Community Development Journal: Jurnal Pengabdian Masyarakat, 2(1), 25–31.
Windara, I. M. A., & Sukranatha, A. K. (2013). Kendala dalam penanggulangan cybercrime sebagai suatu tindak pidana khusus. Kertha Negara: Journal Ilmu Hukum.
Woods, D. W., & Weinkle, J. (2020). Insurance definitions of cyber war. The Geneva Papers on Risk and Insurance-Issues and Practice, 45, 639–656.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Priska Choirina, Muhammat Maariful Huda, Urnika Mudhifatul Jannah, Satria Utama, Erlillah Rizqi Kusuma Pradani
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The authors and other parties are bound to the Attribution-ShareAlike 4.0 International license (CC BY-SA 4.0 DEED) for the published articles. This permits users to:
Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
Adapt — remix, transform, and build upon the material for any purpose, even commercially.
The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.